RMain
ServiceMain
Behavioral task
behavioral1
Sample
6d117697157169fc4fed3ce41052cfaf.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6d117697157169fc4fed3ce41052cfaf.dll
Resource
win10v2004-20231222-en
Target
6d117697157169fc4fed3ce41052cfaf
Size
32KB
MD5
6d117697157169fc4fed3ce41052cfaf
SHA1
8540694bf10ae090c6b6c40867d763722458bfb4
SHA256
52b6c569c318c832a37ea17296fb8d4a04548d399712be86aaa31eedd802b036
SHA512
76144a782f04b59ded643313e7bdff19db83b7bc6ba67e6c2923add64f8fdb50fa55d6bfd627755b85bb7a61a6f43f80f8a9090c24dabf82e95d1eb1aed7805c
SSDEEP
384:305TjNZ7zP7C0lgnW4NCCaL8qwmFI7EyQ4Q+R4ls8JVTwc9NSTEL5e/jxNh1:305fN5vCZ/NCCzeXl9JVkiL5e/jj
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
6d117697157169fc4fed3ce41052cfaf |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
lstrlenA
CloseHandle
CreateThread
LocalFree
LocalAlloc
GetProcAddress
GetLastError
IsBadReadPtr
CancelIo
GetModuleHandleA
OpenProcess
CreateWindowExA
GetMessageA
TranslateMessage
LoadIconA
DispatchMessageA
LoadCursorA
RegisterClassA
GetStockObject
DuplicateTokenEx
CreateProcessAsUserA
SetTokenInformation
ShellExecuteA
CoCreateInstance
CoInitialize
CoUninitialize
GetProcessMemoryInfo
_access
_initterm
malloc
_adjust_fdiv
_except_handler3
wcstombs
strstr
strncpy
free
realloc
_beginthreadex
__CxxFrameHandler
_ftol
??3@YAXPAX@Z
memmove
ceil
??2@YAPAXI@Z
send
WSAStartup
WSACleanup
setsockopt
htons
gethostbyname
socket
select
recv
closesocket
WTSQueryUserToken
CreateEnvironmentBlock
RMain
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ