SUNHACK1
SUNHACK3
ServiceRouteEx
StartServiceEx
StopServiceEx
UNHACK6
Static task
static1
Behavioral task
behavioral1
Sample
01dc2aa2d05f8c08aff945bd715036f5.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
01dc2aa2d05f8c08aff945bd715036f5.dll
Resource
win10v2004-20231215-en
Target
01dc2aa2d05f8c08aff945bd715036f5
Size
24KB
MD5
01dc2aa2d05f8c08aff945bd715036f5
SHA1
bca0972d23795241667b55edb13a537558d64566
SHA256
4277462f225b6b096efa53276190f438802d9f8b0c7b162559c7dc0314909500
SHA512
22bcb78425303b8b2ad84cc87234f9bfaa0648da452f0c5803d7148059d562863f03bdcbe524f0e29b406f3d9458894c679e3667d05cadf397e00d69d0bae4e3
SSDEEP
192:OrmmnxSNVGsVFPKw9uBBQ6PRQkbVSoCC2+Ev3gfWTWa:YwNBYw9uBBQARQkZStClEv3q0Wa
Checks for missing Authenticode signature.
resource |
---|
01dc2aa2d05f8c08aff945bd715036f5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
ExitProcess
Sleep
VirtualProtect
CreateThread
IsBadReadPtr
lstrcatA
CloseHandle
GetModuleFileNameA
SetTimer
wsprintfA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
gethostname
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
_adjust_fdiv
malloc
_initterm
free
strcmp
strrchr
strlen
memset
strcpy
strcat
memcmp
exit
_strlwr
_itoa
SUNHACK1
SUNHACK3
ServiceRouteEx
StartServiceEx
StopServiceEx
UNHACK6
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ