commandline
divxmain
Behavioral task
behavioral1
Sample
0a0fe970fa19e3aab8fc1e3d11c8eaacdbe2b7ad3666e6a3e8f3b5ac7af26be7.dll
Resource
win7-20230712-en
Target
0a0fe970fa19e3aab8fc1e3d11c8eaacdbe2b7ad3666e6a3e8f3b5ac7af26be7
Size
264KB
MD5
64a4caa2ec7a7b1c3b48f69b01764946
SHA1
c6213799296b922abca0f29887cc7310ddf3e845
SHA256
0a0fe970fa19e3aab8fc1e3d11c8eaacdbe2b7ad3666e6a3e8f3b5ac7af26be7
SHA512
cdc8140689cdcdc27a52219e78b28879442a90103282cd6f108b7c46c4e2d76148d1d0c4cdf6248e07fa4ae5c7105b926419377fe60dda564d3195443278959d
SSDEEP
3072:eK1pq7oUSx77mfatibowhA5n1xEWguNykHQAYa/jUt8S1DyLTeIGbzf19:eK1pAoUSx7KrbowaecQaGdIG7
resource | yara_rule |
---|---|
sample | family_blackmoon |
Checks for missing Authenticode signature.
resource |
---|
0a0fe970fa19e3aab8fc1e3d11c8eaacdbe2b7ad3666e6a3e8f3b5ac7af26be7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RtlMoveMemory
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
VirtualFree
GetCommandLineA
GetModuleFileNameA
GetStringTypeW
VirtualAlloc
IsBadReadPtr
lstrcpynA
GetStringTypeA
GetVersion
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
CloseHandle
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
MessageBoxA
wsprintfA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
commandline
divxmain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ