outkorp
Static task
static1
Behavioral task
behavioral1
Sample
ce3b0c52b93b0b83c29fb5e3e34df9bb9adc94aa72eb30c7d8b3ed039883e627.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce3b0c52b93b0b83c29fb5e3e34df9bb9adc94aa72eb30c7d8b3ed039883e627.dll
Resource
win10v2004-20220901-en
General
-
Target
ce3b0c52b93b0b83c29fb5e3e34df9bb9adc94aa72eb30c7d8b3ed039883e627
-
Size
120KB
-
MD5
94a94c7b6b8d0d0fa64a2af151d0e94e
-
SHA1
72d5a284020488b735518fd17b5807c13610ef7a
-
SHA256
ce3b0c52b93b0b83c29fb5e3e34df9bb9adc94aa72eb30c7d8b3ed039883e627
-
SHA512
373d842a307e2ef260158a704b9e010f2612729229a110587bec7075653a6d1a15d3d3ffc147e21c25cce88c7cb7e430d9081e1b763e2b3abe85855cac6b5026
-
SSDEEP
3072:jO28/HePz58sERlTwNxtuJhjC6MsjofwtncQ:jAqtsyYc6djoS
Malware Config
Signatures
Files
-
ce3b0c52b93b0b83c29fb5e3e34df9bb9adc94aa72eb30c7d8b3ed039883e627.dll windows x86
76617e1a081d29216f976c00e1630357
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
wsprintfA
CharNextA
LoadStringA
CharPrevA
MessageBoxExA
advapi32
GetSidLengthRequired
FreeSid
GetSecurityDescriptorDacl
RegEnumValueA
SetFileSecurityA
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegOpenKeyExA
RegCloseKey
InitializeSid
RegQueryValueExA
AllocateAndInitializeSid
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Exports
Exports
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 526B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ