Taoist
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.Attack.787.17773.21365.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BackDoor.Attack.787.17773.21365.dll
Resource
win10v2004-20231020-en
General
-
Target
SecuriteInfo.com.BackDoor.Attack.787.17773.21365.dll
-
Size
66KB
-
MD5
881253af978601784bd5cf1041260f2e
-
SHA1
a97a25b306ffc124e689d64a89f08561b553c14a
-
SHA256
f861f2f92487efd93b8d82800bd0bab8e74e82ee95a6aa34457c5a9fe25f490a
-
SHA512
430ba2c2c0343efa6a72aebaf953f7ace706fbdb7d4c4d770f82ebe2e389ebd559bfa1594bc9e87ca564175755407fb502bf8b301eb774cdd34f9e905f79b2db
-
SSDEEP
768:+oiGAxMTMbi/JALlKJQOIl/EiwvlnkBDnSrTiB9FJTkx8cttge2Ba8:D2MTMbcmON3kBD8+aLtVf8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.BackDoor.Attack.787.17773.21365.dll
Files
-
SecuriteInfo.com.BackDoor.Attack.787.17773.21365.dll.dll windows:4 windows x86
ae48e5acdf579825991fb2f931fd0cf1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateThread
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
CloseHandle
GetCommandLineA
GetVersion
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
GetProcAddress
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
LoadLibraryA
SetFilePointer
InterlockedDecrement
InterlockedIncrement
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
SetWindowTextA
FindWindowA
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ