TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
mukax
Behavioral task
behavioral1
Sample
74deb45a658f08f1996868e474ea2698.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74deb45a658f08f1996868e474ea2698.dll
Resource
win10v2004-20231215-en
Target
74deb45a658f08f1996868e474ea2698
Size
3.2MB
MD5
74deb45a658f08f1996868e474ea2698
SHA1
efaebf8f0705be9192538c180094cf363726d2cd
SHA256
baa470bbef567a0e3421bc93ec9d12785251c9fbfd1bba476b9c9b1e4dd0f075
SHA512
ce2da9965bbd28aabceb32b972e8e4c9f2b61eded5fb3e837e42c92eab1873eefb07cf7c11e3098121c835423bb147a83916c3ff919dc1d6856b480740de8198
SSDEEP
49152:8IEVOeuiZsggh7mP1AexqSWCx77/2xVPohfvQ/E/e:og7rjxVPouG
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
74deb45a658f08f1996868e474ea2698 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
mukax
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE