RunDllHostCallBack
Behavioral task
behavioral1
Sample
d96ae3ef96532ab1953d30c1884b593b67efe629216f294717e601f686d18e12.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d96ae3ef96532ab1953d30c1884b593b67efe629216f294717e601f686d18e12.dll
Resource
win10v2004-20220812-en
General
-
Target
d96ae3ef96532ab1953d30c1884b593b67efe629216f294717e601f686d18e12
-
Size
91KB
-
MD5
acab6f16a1ff5d5a0be4fc339e4aad9e
-
SHA1
b3696093ff7200fab53648d9bacd520eb3df1f5e
-
SHA256
d96ae3ef96532ab1953d30c1884b593b67efe629216f294717e601f686d18e12
-
SHA512
a6585aff998d7152291b6a1177c15c763dcfb0b683a718ef47b8d40c9e60a3027924da5f5cff299ed08862d1b649cb34be7a7ec2ae75dd6033b78986534c3745
-
SSDEEP
1536:WUhfYQEmm8aMsVZZaLoR1NObtFJW9Xy/HRjr0DsXc5Di:5gQEmmMsVZZ/R1sXMMHRED0c5Di
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d96ae3ef96532ab1953d30c1884b593b67efe629216f294717e601f686d18e12.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE