?ReflectiveLoader@@YA_KPEAX@Z
Static task
static1
Behavioral task
behavioral1
Sample
e5af0b9f4650dc0193c9884507e6202b04bb87ac5ed261be3f4ecfa3b6911af8.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e5af0b9f4650dc0193c9884507e6202b04bb87ac5ed261be3f4ecfa3b6911af8.dll
Resource
win10v2004-20230220-en
General
-
Target
e5af0b9f4650dc0193c9884507e6202b04bb87ac5ed261be3f4ecfa3b6911af8.zip
-
Size
6KB
-
MD5
1fa8ba53d5980d61a7294110530db131
-
SHA1
2fb744aa21fcb1b18655c5b5236755e149c9589e
-
SHA256
e731be60a7dddb6f90886163115001bcc6fd98312c54e13224974e3e581da94f
-
SHA512
4db24a6d2e59afa303b9f565304b0f6154bc618a43dd65d3adb12e5699ad5105086690d14422455b380f183cd5d5709a4468580c4ea2a73232198ae1403cbd6d
-
SSDEEP
96:Teh/llBQjNUUx6hrmYC8o6wWXRH3FpXSxVhvQm0Bfoh2H026ckEmShSr5/Boet8f:TeL3Qjzx68f8o6wWBEkdoUL6Nb5P3jet
Malware Config
Signatures
Files
-
e5af0b9f4650dc0193c9884507e6202b04bb87ac5ed261be3f4ecfa3b6911af8.zip.zip
Password: infected
-
e5af0b9f4650dc0193c9884507e6202b04bb87ac5ed261be3f4ecfa3b6911af8.exe.dll windows x64
Password: infected
c1d1febbe45a60da209c85a2f3720ca0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateRemoteThread
GetLastError
WriteProcessMemory
Sleep
WriteFile
CloseHandle
lstrcpyA
lstrlenA
CreateThread
CreateProcessA
GetTempPathA
GetTempFileNameA
CreateFileA
GetComputerNameExA
GetVersionExA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcessId
OpenProcess
VirtualAllocEx
VirtualAlloc
LocalFree
LocalSize
LocalAlloc
GetModuleHandleA
GetProcAddress
user32
wsprintfA
advapi32
CryptDecrypt
CryptImportKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
GetUserNameA
SystemFunction036
CryptEncrypt
ws2_32
closesocket
connect
htons
inet_addr
inet_ntoa
recv
select
send
socket
gethostbyname
WSAStartup
WSACleanup
Exports
Exports
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ