DadoLevoas
Static task
static1
Behavioral task
behavioral1
Sample
0adbba8b7a4b1e7aa6d1652b3c1156f29c091c7c998dc1241389fefaf513dc6e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0adbba8b7a4b1e7aa6d1652b3c1156f29c091c7c998dc1241389fefaf513dc6e.exe
Resource
win10v2004-20220901-en
General
-
Target
0adbba8b7a4b1e7aa6d1652b3c1156f29c091c7c998dc1241389fefaf513dc6e
-
Size
254KB
-
MD5
7a254faa8ca6ba776f80216995447bac
-
SHA1
b5e002682bca364420d5aa40e890e9f40adb40ad
-
SHA256
0adbba8b7a4b1e7aa6d1652b3c1156f29c091c7c998dc1241389fefaf513dc6e
-
SHA512
e6c822d143668df510523649d427b3af53623a29309b7f0ead7fbfccf28b347a3d21f84f94c92d1f37aeedb83175592f48c10cca5c798799a489163f61e1f7bc
-
SSDEEP
3072:LpQ3DEdQ52Hso29nXghD2M7ti7LvNmDRbCgkYWT222bLFJvurt6oAp/V2S11GW3s:MDEd1MUZKJLgnWf2b+yJB91LA
Malware Config
Signatures
Files
-
0adbba8b7a4b1e7aa6d1652b3c1156f29c091c7c998dc1241389fefaf513dc6e.exe windows x86
e5b0fe691821b5692b8292813e38d830
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
LoadTypeLi
VarBoolFromI8
VarDecAdd
RegisterTypeLi
BSTR_UserUnmarshal
VarBstrCmp
VarBoolFromDate
VarBoolFromDisp
ole32
OleConvertOLESTREAMToIStorage
WriteClassStm
OleDoAutoConvert
CoQueryClientBlanket
CoTaskMemRealloc
CLSIDFromProgIDEx
StgIsStorageILockBytes
WriteFmtUserTypeStg
CoGetStdMarshalEx
OleGetAutoConvert
OleSetClipboard
OleInitialize
shell32
ShellExecuteExW
ord73
SHGetDesktopFolder
SHBrowseForFolderA
ord701
ord88
SHGetFolderPathAndSubDirA
ord23
ord14
ord192
ord21
ord680
glu32
gluScaleImage
gluDeleteTess
gluTessEndContour
gluPwlCurve
gluProject
gluNextContour
gluTessBeginPolygon
gluTessEndPolygon
gluLookAt
gluNewNurbsRenderer
shlwapi
PathQuoteSpacesA
ord29
PathIsPrefixW
PathIsSameRootA
ChrCmpIA
PathRemoveExtensionA
PathIsContentTypeW
PathMakeSystemFolderA
ord157
comctl32
ImageList_LoadImageA
CreatePropertySheetPageA
ImageList_Create
ImageList_Remove
ord6
ImageList_Write
DestroyPropertySheetPage
ImageList_Destroy
CreateStatusWindowW
ImageList_Read
ImageList_GetIconSize
ImageList_ReplaceIcon
CreateToolbarEx
ImageList_Draw
kernel32
CreateProcessA
GetLocaleInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetProcAddress
FreeLibrary
InterlockedExchange
GetLastError
LoadLibraryA
GetCurrentProcess
GetEnvironmentVariableW
EnumResourceNamesW
RaiseException
lstrcatA
CreateSemaphoreW
LocalAlloc
DeviceIoControl
GetOEMCP
ScrollConsoleScreenBufferW
EnumResourceTypesW
ReadProcessMemory
DeleteVolumeMountPointW
user32
IsIconic
GetThreadDesktop
MapVirtualKeyA
MessageBoxA
SendMessageTimeoutA
GetMenuStringA
EnableScrollBar
GetDlgItemTextA
SetDlgItemTextA
SendDlgItemMessageA
SetUserObjectInformationW
IsCharAlphaW
SendMessageA
GetKeyboardLayoutNameA
GetShellWindow
LookupIconIdFromDirectory
gdi32
MoveToEx
AddFontResourceW
CreateCompatibleDC
GetStockObject
GetSystemPaletteUse
ScaleWindowExtEx
PtInRegion
CreateMetaFileW
RealizePalette
comdlg32
GetSaveFileNameW
ChooseFontW
PrintDlgExW
GetOpenFileNameW
PrintDlgA
GetFileTitleA
GetFileTitleW
CommDlgExtendedError
advapi32
GetTraceEnableFlags
EnumDependentServicesA
TraceEvent
IsValidSid
ControlService
EnumServicesStatusA
EnumServicesStatusExW
RegNotifyChangeKeyValue
AccessCheckByTypeResultListAndAuditAlarmByHandleW
GetTrusteeTypeW
LsaRetrievePrivateData
Exports
Exports
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ