Static task
static1
Behavioral task
behavioral1
Sample
ca61d1da431279e3cda50ed1c8762bfb9a80768a635b96bdf26c5537b58b87ca.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca61d1da431279e3cda50ed1c8762bfb9a80768a635b96bdf26c5537b58b87ca.dll
Resource
win10v2004-20220812-en
General
-
Target
ca61d1da431279e3cda50ed1c8762bfb9a80768a635b96bdf26c5537b58b87ca
-
Size
33KB
-
MD5
52c48231383fd96c0c6333ed135ab78f
-
SHA1
a85940eac09b871681126998c3c2dc2f8b197299
-
SHA256
ca61d1da431279e3cda50ed1c8762bfb9a80768a635b96bdf26c5537b58b87ca
-
SHA512
5004def41f96b4983ab592f07ad5ea99037750d11e314855da34be92e5c874e666a4e09782d10c52c6528a4c228839ffcb319550e42db1a452f3c5e5d0e0e7a9
-
SSDEEP
768:pH4aBVqnqHBD4Sti108HmOSZdN4sbCaPUbPTBBQARQk7JvC:OKRXbCaPUbbBBQAR
Malware Config
Signatures
Files
-
ca61d1da431279e3cda50ed1c8762bfb9a80768a635b96bdf26c5537b58b87ca.dll windows x86
13792da93a77123cada647ea284ef43c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlZeroMemory
_snprintf
_strupr
RtlUnwind
atoi
memcmp
memcpy
strlen
strstr
ws2_32
connect
closesocket
socket
send
gethostbyname
recv
inet_addr
htons
gethostname
kernel32
ExitProcess
lstrcpynA
WriteFile
WideCharToMultiByte
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
ReadFile
MoveFileExA
MapViewOfFile
GetTempPathA
GetTempFileNameA
GetStartupInfoA
GetLastError
GetFileSize
GetExitCodeThread
DeleteFileA
CloseHandle
CreateThread
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
GlobalFree
LoadLibraryA
Sleep
TerminateThread
WaitForSingleObject
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
CreateProcessA
IsBadReadPtr
WritePrivateProfileStringA
CreateFileA
CreateFileMappingA
user32
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
CallNextHookEx
wsprintfA
UnhookWindowsHookEx
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 714B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ