Static task
static1
Behavioral task
behavioral1
Sample
93ebc55e999a11a77ba44a5d3ec22620e482c15515859185a0a4e9268a554bc5.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
93ebc55e999a11a77ba44a5d3ec22620e482c15515859185a0a4e9268a554bc5.dll
Resource
win10v2004-20221111-en
General
-
Target
93ebc55e999a11a77ba44a5d3ec22620e482c15515859185a0a4e9268a554bc5
-
Size
52KB
-
MD5
acb16c2e18ca8a021fdbe573fc023ba0
-
SHA1
371309837b564631d6b59021c2d68195a61b4d7b
-
SHA256
93ebc55e999a11a77ba44a5d3ec22620e482c15515859185a0a4e9268a554bc5
-
SHA512
0f9ec9bd3a83fda9b8c1d7e13369e00a23f6559db1d23ee6038e5bc4b4a38460ebd59f3750ce4f8a37db9676d8ad6902a7dfc1b8ca746689d081786c3cf9be6c
-
SSDEEP
768:H09AkbnWs2c6QGk3lw1GsGamkJ/1WbE1YV2tcKm5:lkSs2XQ73l7sRmkJLtuP5
Malware Config
Signatures
Files
-
93ebc55e999a11a77ba44a5d3ec22620e482c15515859185a0a4e9268a554bc5.dll windows x86
b17190fe939c3ba1e91d42f6e5c4cbb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
WriteFile
WriteProcessMemory
GetCurrentProcess
VirtualProtect
CreateFileA
WaitNamedPipeA
GetProcAddress
GetModuleHandleA
msvcrt
_initterm
malloc
_adjust_fdiv
free
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 406B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pid0 Size: 4KB - Virtual size: 228B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pid1 Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ