Static task
static1
Behavioral task
behavioral1
Sample
49db12b3461c259552828a46377d59749539912bccbfab035fe9dfedfa0799e2.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
49db12b3461c259552828a46377d59749539912bccbfab035fe9dfedfa0799e2.dll
Resource
win10v2004-20230220-en
General
-
Target
dc2b75cc965b3628da9c825233170aaa.bin
-
Size
79KB
-
MD5
c35aafff7062bab8bd8ed632571f6c50
-
SHA1
66c68fe923de61647b13d10a7613decbe38d0372
-
SHA256
fdeeb65d0c8264534515592d4c8c3c9116f74f55cbe697ee12db675a3658d5a7
-
SHA512
bf326e4656a8045c19b91f1e869fd60119aa28a1973ba455264ecd452f44ad33884d2981a2bc7d45c11d5a765918e3473fe48348ce510c143aa2d0d4f0df2ce8
-
SSDEEP
1536:pSvJWKpaXHjNLIBjqSBJ3RiWAmi1uwjjBeqFSIB+R5/z1A71552KNc3Q+0S:pqJWAGjSjqilRiNpiIB8b1A/MKmANS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/49db12b3461c259552828a46377d59749539912bccbfab035fe9dfedfa0799e2.dll
Files
-
dc2b75cc965b3628da9c825233170aaa.bin.zip
Password: infected
-
49db12b3461c259552828a46377d59749539912bccbfab035fe9dfedfa0799e2.dll.dll windows x86
Password: infected
5c54715227e960c5019e7a45d4b9d02a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE