RunDllHostCallBack
Behavioral task
behavioral1
Sample
41e9d09595a5a45146b84edc953d62fa009755d534dd57e16f9e3fb5d69123f7.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41e9d09595a5a45146b84edc953d62fa009755d534dd57e16f9e3fb5d69123f7.dll
Resource
win10v2004-20221111-en
General
-
Target
41e9d09595a5a45146b84edc953d62fa009755d534dd57e16f9e3fb5d69123f7
-
Size
86KB
-
MD5
634aaa9139a2411479e239ca7828cf60
-
SHA1
8e5bbde2e2f589bb813fcc835c487444c0bd69f7
-
SHA256
41e9d09595a5a45146b84edc953d62fa009755d534dd57e16f9e3fb5d69123f7
-
SHA512
c06a50f6aff49e72ff26de7bb2dfb111b1256db1207ff571110679080f7b3e68977205853eb5023084cd01c899354142d44bcc46265e44dc8cb09b8ff2d20ca9
-
SSDEEP
1536:TyXpW8Yxc4twuyTwrouaPc0hrqVr6On8LukkQOEK:TyZLYm4WuyT3hWVVnCbllK
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
41e9d09595a5a45146b84edc953d62fa009755d534dd57e16f9e3fb5d69123f7.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE