X
Behavioral task
behavioral1
Sample
a6c03cc0eb4061754510273ebcf28e4edd9fefc66dee0ae0316cf7f71d32a9fb.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6c03cc0eb4061754510273ebcf28e4edd9fefc66dee0ae0316cf7f71d32a9fb.dll
Resource
win10v2004-20221111-en
General
-
Target
a6c03cc0eb4061754510273ebcf28e4edd9fefc66dee0ae0316cf7f71d32a9fb
-
Size
164KB
-
MD5
f64fd72a0ede40475e47fe8d9cefaa46
-
SHA1
53e84282374f810f0524af588b90783037767b79
-
SHA256
a6c03cc0eb4061754510273ebcf28e4edd9fefc66dee0ae0316cf7f71d32a9fb
-
SHA512
47eb7f066ed875dfad7286d5037745ddf41ab6bbbc48f7b270d50928a3eff5e277e0c041f3c78d4846b9cada09806d49d79085382273fd4da8f2c665c14a2a7a
-
SSDEEP
3072:53oqjXxfYKeBB8ZA0s9iVKjyLfiwkXplY5E0EGw3NaTjWMskHUuVpre71rr:53jjXF6OA0uiVK2LaNpUE/4jWMs8Vpr4
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
a6c03cc0eb4061754510273ebcf28e4edd9fefc66dee0ae0316cf7f71d32a9fb.dll windows x86
e44974d0ce1945e4f5ca3da164e437bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
MessageBoxA
kernel32
CreateRemoteThread
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
psapi
GetModuleBaseNameA
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 803B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 190B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ