CatDBMobilevga
Static task
static1
Behavioral task
behavioral1
Sample
a1e4152b7f2311b82a1fb3249ae3d60e79d51c93af570649edba90eaf88526b6.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a1e4152b7f2311b82a1fb3249ae3d60e79d51c93af570649edba90eaf88526b6.dll
Resource
win10v2004-20220901-en
General
-
Target
a1e4152b7f2311b82a1fb3249ae3d60e79d51c93af570649edba90eaf88526b6
-
Size
140KB
-
MD5
fd42541f0dba04d2dce385eed0be8844
-
SHA1
2c49901b6b3df380aa7bb1eec96b70740acd0f45
-
SHA256
a1e4152b7f2311b82a1fb3249ae3d60e79d51c93af570649edba90eaf88526b6
-
SHA512
ece477448edc719c57fd9f00dc6c6057e70d99b88ed89b5f49f0fe33134b6384c7c5d2e8e0b904be9fe7e18e6e4fe10e26a9dd71633625b2660b6da20b6c7863
-
SSDEEP
3072:w5CC62lckJfDLWjiRByAdjbGciXsMHpkVA1bP:w5TvL9EURiXsMaeh
Malware Config
Signatures
Files
-
a1e4152b7f2311b82a1fb3249ae3d60e79d51c93af570649edba90eaf88526b6.dll windows x86
d448fb77c4fdedaa67a1ced327dfb6e9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenEventA
MapViewOfFile
CloseHandle
WriteFile
CreateProcessA
GetProcessHeap
GetTickCount
GetCommandLineA
InterlockedDecrement
GetVolumeInformationA
LeaveCriticalSection
LoadLibraryA
LocalFree
CreateMutexW
CreateEventA
UnmapViewOfFile
InterlockedCompareExchange
GlobalAlloc
GetComputerNameA
Sleep
WriteProcessMemory
HeapAlloc
GetModuleHandleA
ExitProcess
CreateDirectoryA
WaitForSingleObject
ReadProcessMemory
GetCurrentProcess
HeapFree
GetLastError
GlobalFree
GetModuleFileNameA
OpenFileMappingA
CreateFileMappingA
EnterCriticalSection
GetProcAddress
InterlockedIncrement
TerminateProcess
SetLastError
CopyFileA
CreateFileA
ole32
CoCreateGuid
CoTaskMemAlloc
CoInitialize
OleSetContainedObject
OleCreate
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
user32
DefWindowProcA
UnhookWindowsHookEx
DispatchMessageA
GetWindowThreadProcessId
GetMessageA
PostQuitMessage
PeekMessageA
GetCursorPos
GetParent
CreateWindowExA
SetWindowLongA
ClientToScreen
FindWindowA
ScreenToClient
GetWindow
RegisterWindowMessageA
KillTimer
GetSystemMetrics
GetClassNameA
DestroyWindow
TranslateMessage
SendMessageA
GetWindowLongA
SetWindowsHookExA
SetTimer
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
DuplicateTokenEx
GetUserNameA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
OpenProcessToken
RegOpenKeyExA
RegCloseKey
SetTokenInformation
RegDeleteValueA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ