DllMain
Behavioral task
behavioral1
Sample
ee24110ddb4121b31561f86692650b63215a93fb2357b2bd3301fabc419290a3.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ee24110ddb4121b31561f86692650b63215a93fb2357b2bd3301fabc419290a3.dll
Resource
win10v2004-20231020-en
General
-
Target
ee24110ddb4121b31561f86692650b63215a93fb2357b2bd3301fabc419290a3.dll
-
Size
3.6MB
-
MD5
37155f0bca29ccd6b6d4f5b2bc42eb4d
-
SHA1
998f5e133484d7b9186b82b2c96a0f6bfdf3f394
-
SHA256
ee24110ddb4121b31561f86692650b63215a93fb2357b2bd3301fabc419290a3
-
SHA512
a71694509ec161fd03e5c38ab61f48fa73547402efbf637ae058ad235d77e3f85973131fdabde34f33b94502f5ab7e1b20f4564d0e73d6544ef4659288877652
-
SSDEEP
98304:wZgC/TFBEKgU3fp9qupTBzCkyZQwFwPD+8th5Gf:wZgCTDgU3fp9RpTBCkyZYUf
Malware Config
Extracted
agenda
-
company_id
QTduEqZI6Q
-
note
-- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from you system/network If you refuse to communicate with us and we do not come to an agreement, your data will be published. Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials-- Credentials Extension: QTduEqZI6Q Domain: p3q5g2qsq4tglsbyhlghzutwr75uyz47ozasrserev7kann5h7qedxid.onion login: BYxo9FGIiH58sNWWzh967d5fQexHPomf password:
Signatures
-
Agenda family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ee24110ddb4121b31561f86692650b63215a93fb2357b2bd3301fabc419290a3.dll
Files
-
ee24110ddb4121b31561f86692650b63215a93fb2357b2bd3301fabc419290a3.dll.dll windows:4 windows x86 arch:x86
15390616e614eec01aad923da301a7f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
AcquireSRWLockExclusive
AcquireSRWLockShared
CancelIo
CloseHandle
CompareStringOrdinal
CreateDirectoryW
CreateEventW
CreateFileMappingA
CreateFileW
CreateMutexA
CreateMutexW
CreateNamedPipeW
CreateProcessW
CreateSemaphoreW
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
FreeConsole
FreeEnvironmentStringsW
FreeLibrary
GetCommandLineW
GetComputerNameExW
GetConsoleMode
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetErrorMode
GetExitCodeProcess
GetFileAttributesW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
GetLastError
GetLogicalDrives
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetProcessId
GetProcessIoCounters
GetProcessTimes
GetStdHandle
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemTimes
GetTempPathW
GetTickCount64
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalMemoryStatusEx
HeapAlloc
HeapFree
HeapReAlloc
InitOnceBeginInitialize
InitOnceComplete
InitializeCriticalSection
IsDBCSLeadByteEx
IsWow64Process
LeaveCriticalSection
LoadLibraryA
MapViewOfFile
Module32FirstW
Module32NextW
MoveFileExW
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
QueryPerformanceFrequency
ReadConsoleW
ReadFile
ReadFileEx
ReleaseMutex
ReleaseSRWLockExclusive
ReleaseSRWLockShared
ReleaseSemaphore
RtlCaptureContext
SetErrorMode
SetFileAttributesW
SetFilePointerEx
SetLastError
SetThreadStackGuarantee
SetThreadToken
Sleep
SleepConditionVariableSRW
SleepEx
SwitchToThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WriteConsoleW
WriteFileEx
msvcrt
__mb_cur_max
_amsg_exit
_errno
_initterm
_iob
_lock
_unlock
abort
atoi
calloc
fputc
free
fwrite
localeconv
malloc
memcmp
memcpy
memmove
memset
realloc
setlocale
strchr
strerror
strlen
strncmp
vfprintf
wcslen
secur32
LsaEnumerateLogonSessions
LsaFreeReturnBuffer
LsaGetLogonSessionData
ntdll
NtReadFile
NtWriteFile
NtQuerySystemInformation
RtlNtStatusToDosError
advapi32
AdjustTokenPrivileges
ChangeServiceConfigW
ControlService
ConvertSidToStringSidW
CopySid
CreateProcessWithTokenW
DuplicateTokenEx
EnumDependentServicesW
EnumServicesStatusW
GetLengthSid
GetTokenInformation
GetUserNameW
IsValidSid
LookupAccountSidW
LookupPrivilegeValueA
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceStatusEx
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RevertToSelf
SystemFunction036
bcrypt
BCryptGenRandom
iphlpapi
FreeMibTable
GetAdaptersAddresses
GetIfEntry2
GetIfTable2
mpr
WNetCloseEnum
WNetEnumResourceW
WNetGetLastErrorA
WNetOpenEnumW
netapi32
NetApiBufferFree
NetShareEnum
NetUserEnum
NetUserGetInfo
NetUserGetLocalGroups
NetUserSetInfo
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
pdh
PdhAddEnglishCounterW
PdhCloseQuery
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhOpenQueryA
PdhRemoveCounter
powrprof
CallNtPowerInformation
psapi
EnumProcesses
GetModuleFileNameExW
GetPerformanceInfo
GetProcessImageFileNameW
rstrtmgr
RmEndSession
RmGetList
RmRegisterResources
RmStartSession
shell32
ShellExecuteA
user32
ExitWindowsEx
SystemParametersInfoW
ws2_32
WSACleanup
WSAGetLastError
WSAStartup
freeaddrinfo
getaddrinfo
Exports
Exports
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ