Behavioral task
behavioral1
Sample
61bf63f5aef06ca2f6981498c64e9da270f83cb3529aec98c74a7befa6066b46.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61bf63f5aef06ca2f6981498c64e9da270f83cb3529aec98c74a7befa6066b46.dll
Resource
win10v2004-20220812-en
General
-
Target
61bf63f5aef06ca2f6981498c64e9da270f83cb3529aec98c74a7befa6066b46
-
Size
164KB
-
MD5
4187ad654a61d32c213abf1c6b1d7570
-
SHA1
11debb2427682611152b117c58024b7f36263b01
-
SHA256
61bf63f5aef06ca2f6981498c64e9da270f83cb3529aec98c74a7befa6066b46
-
SHA512
59513885332525bf8e6f53bdc915c4c139d4c67cfd93c4ee09538d3ce6dec3a7af8ba2a2aba308d4bb180feb45b7769f568dc4c277afce494f797170040e6e44
-
SSDEEP
3072:q3nIFLBJJntJgSuOiRO9AqlTnNxISRx3rAsR3a6fOTU4BLzm/PQgEH:qnIFPJgSvqO9Xnbx7AsqEOTUWiog
Malware Config
Signatures
-
resource yara_rule sample vmprotect
Files
-
61bf63f5aef06ca2f6981498c64e9da270f83cb3529aec98c74a7befa6066b46.dll windows x86
13ab2ec750343465737f1d849b963e88
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetCursorPos
gdi32
GetPixel
Sections
.text Size: - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 354KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ