DllCanUnloadNow
DllGetClassObject
Okkmlok
DllMain
DllRegisterServer
DllUnregisterServer
ServiceMain
Behavioral task
behavioral1
Sample
96126029aa3233955b0c0e19a716d32f7015d1ab73255b75f6699a42ad3a5559.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
96126029aa3233955b0c0e19a716d32f7015d1ab73255b75f6699a42ad3a5559.dll
Resource
win10v2004-20220812-en
Target
96126029aa3233955b0c0e19a716d32f7015d1ab73255b75f6699a42ad3a5559
Size
216KB
MD5
2a0188bfad4be363ed030eb486ec6a54
SHA1
aacc40dc0ef6e1004ad8f4a03a4f6f14cac26e87
SHA256
96126029aa3233955b0c0e19a716d32f7015d1ab73255b75f6699a42ad3a5559
SHA512
2f2d5100aeeb6ff621c08fbe5417aa99babcf8ef3bcbc74e702cf75d47aa493bc71620a018221dd011a94e1fccf416f9b1a86d4a2f7dcb4cec042322dbb2fe81
SSDEEP
6144:zhrl1NWPLfVYF3xqEhNR7mYd+Y2oSFOgO:PjWjVymYotoSFk
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
Okkmlok
DllMain
DllRegisterServer
DllUnregisterServer
ServiceMain
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE