Behavioral task
behavioral1
Sample
3cc545e42b9bb14df4a63f2a37aebdb0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3cc545e42b9bb14df4a63f2a37aebdb0.dll
Resource
win10v2004-20231215-en
General
-
Target
3cc545e42b9bb14df4a63f2a37aebdb0
-
Size
18KB
-
MD5
3cc545e42b9bb14df4a63f2a37aebdb0
-
SHA1
0870d930e449a1b30934b48204589f852ce9ac16
-
SHA256
50b6a68c1b4d4e8f7ca37efbccb56abb4b35a9cd7228fa181ad95c782e11613e
-
SHA512
530d2d179c3ebb64855ae604c8b0c0b9d77e0ea0c9612296a6f3f1b88309a126c6baec097c69b1551367c5078e9cb29598b55050b336fe7d610d99073dac6307
-
SSDEEP
384:zpYMTvO5ruu5NYWwLM99SYogCrWFOpHwCg8jNCzjXbDXvP2m:OyvIuBWl9UYogOWFOVwuCzjXbDXF
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cc545e42b9bb14df4a63f2a37aebdb0
Files
-
3cc545e42b9bb14df4a63f2a37aebdb0.dll windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
UPX0 Size: 12KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ