�ӳ���1
Static task
static1
Behavioral task
behavioral1
Sample
6d2fad48580121f84c664135559f6eab88f926d532896f89e078de0a0d06a3f9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d2fad48580121f84c664135559f6eab88f926d532896f89e078de0a0d06a3f9.dll
Resource
win10v2004-20220812-en
General
-
Target
6d2fad48580121f84c664135559f6eab88f926d532896f89e078de0a0d06a3f9
-
Size
52KB
-
MD5
5bc1c4ef1d847de7fbc926a6ac8db576
-
SHA1
862cbae563e4d88d1af08844f9f4fa2dc52f5615
-
SHA256
6d2fad48580121f84c664135559f6eab88f926d532896f89e078de0a0d06a3f9
-
SHA512
c9c24835dff7ea74ce5d5d913fc4a15cc37634bd4d9e82a9e6909ea7e2b1a9d4d88dc2c3264cb0c7ec27a560514307ea0904b19d52f3a58518e76b765f5203ee
-
SSDEEP
768:QL6ZC0S5paGQ6yfLsa6QByqRYQorthXyvDoNLj:2EC0S5RPyjsa6Qb+QophXyvDo
Malware Config
Signatures
Files
-
6d2fad48580121f84c664135559f6eab88f926d532896f89e078de0a0d06a3f9.dll windows x86
335fa6597706228910583ae3544e9461
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
CreateToolhelp32Snapshot
Process32Next
CloseHandle
GetModuleHandleA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
VirtualProtect
FreeLibrary
ReadProcessMemory
WriteProcessMemory
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
LCMapStringA
msvcrt
atoi
_ftol
sprintf
strtod
strncpy
??3@YAXPAX@Z
strncmp
??2@YAPAXI@Z
free
malloc
strchr
modf
realloc
memmove
__CxxFrameHandler
user32
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
MessageBoxA
Exports
Exports
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ