Static task
static1
Behavioral task
behavioral1
Sample
acba25cb4f9c51a34cad5a16a9555d9e02cc4d399bc9321fa7fdb430e13f4ceb.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
acba25cb4f9c51a34cad5a16a9555d9e02cc4d399bc9321fa7fdb430e13f4ceb.dll
Resource
win10v2004-20220812-en
General
-
Target
acba25cb4f9c51a34cad5a16a9555d9e02cc4d399bc9321fa7fdb430e13f4ceb
-
Size
28KB
-
MD5
cfb59c37695333a46338e2764caea850
-
SHA1
5bb3c2a9b496874500404fcc00602038aa59a073
-
SHA256
acba25cb4f9c51a34cad5a16a9555d9e02cc4d399bc9321fa7fdb430e13f4ceb
-
SHA512
4b8440a37da5d4923775839b2d8c87f7d3a415c9d936be0ab6fa013b30e6a91bd83e6d918f10ba0b27caa98d3c45e5a8c87dfe8f96a35a41686889a7437f5659
-
SSDEEP
192:nX40oN68G7DTb2Pv5ap9Dcx4kpj8JrKg0ef1:o0o88G7DXSxawxzGXt
Malware Config
Signatures
Files
-
acba25cb4f9c51a34cad5a16a9555d9e02cc4d399bc9321fa7fdb430e13f4ceb.dll windows x86
53c28d44111c0599daeb2dad4c32426e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4278
ord939
ord2818
ord858
ord860
ord2764
ord540
ord537
ord800
msvcrt
_adjust_fdiv
malloc
_initterm
free
?terminate@@YAXXZ
_onexit
__dllonexit
_except_handler3
strstr
__CxxFrameHandler
kernel32
GetCurrentProcessId
CreateThread
OpenProcess
GetModuleFileNameA
Sleep
ReadFile
SetFilePointer
GetFileSize
CreateFileA
CloseHandle
user32
UnhookWindowsHookEx
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowsHookExA
CallNextHookEx
ws2_32
recv
closesocket
send
connect
htons
socket
gethostbyname
WSAStartup
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SHARDAT Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ