Fibo
Static task
static1
Behavioral task
behavioral1
Sample
99692257c531627daab919714ab59f741c8e018b907239af1247e75eca895d88.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
99692257c531627daab919714ab59f741c8e018b907239af1247e75eca895d88.dll
Resource
win10v2004-20231023-en
General
-
Target
99692257c531627daab919714ab59f741c8e018b907239af1247e75eca895d88
-
Size
264KB
-
MD5
90a20bd16e76e9ae59f5bac72a82ad46
-
SHA1
33dc01c5a1023393420d2d69b8959bf8dcb57f18
-
SHA256
99692257c531627daab919714ab59f741c8e018b907239af1247e75eca895d88
-
SHA512
aa7889981ce6e5753f30db8414ce3fd5d1dfe324a54aed1d385d707e7a2b93b2d6b269d984c575392562e7fb8394d8920f52eb75807af900c529d481b09eee4d
-
SSDEEP
6144:PqDerIVEjnluV8INKXPQnZ+DUiMMLSzXrrGUZlL+:PqDerq2luV8sKQ0DyMKXHu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 99692257c531627daab919714ab59f741c8e018b907239af1247e75eca895d88
Files
-
99692257c531627daab919714ab59f741c8e018b907239af1247e75eca895d88.dll windows:4 windows x86
11be08d22e1f744689aaeaff0f3f1aa9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCPInfo
GetOEMCP
GetFileAttributesA
RtlUnwind
CreateDirectoryA
RaiseException
GetCommandLineA
HeapFree
HeapAlloc
HeapReAlloc
ExitProcess
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
TerminateProcess
WriteFile
HeapSize
GetACP
GetTimeZoneInformation
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
ReadFile
CreateFileA
GetCurrentProcess
GetProcessVersion
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
WritePrivateProfileStringA
GlobalFlags
GetLastError
SetLastError
GetVersion
lstrcpynA
lstrcatA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
CloseHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
LocalFree
lstrlenA
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
GetTickCount
MultiByteToWideChar
Sleep
MoveFileA
DeleteFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetProcessTimes
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpyA
CreateProcessA
user32
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetFocus
SetWindowLongA
IsIconic
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
GetWindowPlacement
GetSystemMetrics
FindWindowA
FindWindowExA
GetWindowTextA
EnumWindows
GetClassNameA
GetWindowThreadProcessId
SetWindowPos
ShowWindow
wsprintfA
EnableMenuItem
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ole32
CoUninitialize
CoCreateInstance
IIDFromString
CLSIDFromString
CoInitialize
Exports
Exports
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ