Activate
Static task
static1
Behavioral task
behavioral1
Sample
0254e25d632bd84e35ecbddd92dd7b3b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0254e25d632bd84e35ecbddd92dd7b3b.dll
Resource
win10v2004-20231215-en
General
-
Target
0254e25d632bd84e35ecbddd92dd7b3b
-
Size
21KB
-
MD5
0254e25d632bd84e35ecbddd92dd7b3b
-
SHA1
9bc02dfe845cd306a173e87ad8a9d63785c1bdaf
-
SHA256
3868f6558169ab2b057f8456edc4a88054abe3352a4c11e2d2ef111d3f6aaf23
-
SHA512
99b45184f602cab5feb0f3c861c25dd2f332e367990428146585a7a51f2229ee342664aaab15a47b4653bdacc8513a12c899c909369c87632d8bebc5a5ee2c0f
-
SSDEEP
384:xhiTsZWobVOQH+zsRzm/zVR3r1FOopRCK:/ZWy5Hsl3/OSV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0254e25d632bd84e35ecbddd92dd7b3b
Files
-
0254e25d632bd84e35ecbddd92dd7b3b.dll windows:4 windows x86 arch:x86
48cc11b5eeb642812df5e9171aa6b7ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
WSACleanup
WSAStartup
recv
closesocket
send
gethostbyname
htons
socket
connect
kernel32
CloseHandle
OpenEventA
SetEvent
VirtualQuery
CreateThread
GetTickCount
lstrcatA
lstrlenA
GetWindowsDirectoryA
GetSystemDirectoryA
lstrcmpiA
lstrcpyA
lstrcpynA
GetSystemTime
GlobalFree
GlobalAlloc
lstrcmpA
DeleteFileA
GetTempFileNameA
GetTempPathA
WinExec
GetModuleFileNameA
RtlUnwind
WriteFile
CreateFileA
CreateProcessA
GetLastError
FileTimeToSystemTime
FindClose
FindFirstFileA
GetComputerNameA
Sleep
CreateMutexA
ExitProcess
user32
SetWindowsHookExA
CallNextHookEx
SendMessageA
CharLowerA
wsprintfA
advapi32
RegCreateKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ