FuckESETNOD32
FuckGIRLS
FuckJM
FuckJS
FuckKV360
FuckKaspersky
FuckKillVirus
FuckPLMM
FuckRiSing
ResetChangedSSDT
ServiceMain
hacker1
hacker2
hacker3
hacker4
hacker5
Behavioral task
behavioral1
Sample
0612e3e293b32f16c354012009995204.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0612e3e293b32f16c354012009995204.dll
Resource
win10v2004-20231215-en
Target
0612e3e293b32f16c354012009995204
Size
102KB
MD5
0612e3e293b32f16c354012009995204
SHA1
118684a8249fc66f20d5e338b56692893f228038
SHA256
2d5c11b30e2b3989ba0640408bf0f22e175ca5cd683fc51d8d044b7e96b7b654
SHA512
1b82e7a6114ebe24e318d6479a4e26bf9437239519c15448921e1e87bb03f37fc426afa6f4358ea96e3a4aae90cbd06e56207fe2eccabb557fd7f67134cafda5
SSDEEP
1536:rPDwg9cgc2rgGjz8MoMtYtcngOf9+8tWGuotiz67lW2B:DDagckgGjp3YtQgI9+8s1otOQlW2B
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
0612e3e293b32f16c354012009995204 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
lstrcatA
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
GetTickCount
GetLocalTime
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
LoadLibraryExA
GetModuleHandleA
SetFileAttributesA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
RaiseException
strrchr
strncpy
strncat
realloc
atoi
sprintf
_except_handler3
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
wcstombs
??3@YAXPAX@Z
_strnicmp
??2@YAPAXI@Z
_strcmpi
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSeqCompressFrame
ICSendMessage
FuckESETNOD32
FuckGIRLS
FuckJM
FuckJS
FuckKV360
FuckKaspersky
FuckKillVirus
FuckPLMM
FuckRiSing
ResetChangedSSDT
ServiceMain
hacker1
hacker2
hacker3
hacker4
hacker5
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ