nudroue
Static task
static1
Behavioral task
behavioral1
Sample
1330a5499140a74632f64717b837d43e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1330a5499140a74632f64717b837d43e.dll
Resource
win10v2004-20231222-en
General
-
Target
1330a5499140a74632f64717b837d43e
-
Size
92KB
-
MD5
1330a5499140a74632f64717b837d43e
-
SHA1
2dc69acd276079527b6235684adcb57cf83847ca
-
SHA256
7daaabea296a82d4181e83526d48f5d9fb15d8b83655ec090847d4eaabfef9ed
-
SHA512
6ec98be9dac82ed6e391211a8f411cc3f4b4999190ea7b26a2ddb10fa52372fc5a83357a64ac92766aad1e9943c00ee9937baf9a83157a93f00c242a9b8a1a84
-
SSDEEP
1536:qbV1PE19QW7dySQzFOzvlprFLqKXaL0GY09CUfEuUiTcEK96:yy7dzvlprpqKXarHEYTz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1330a5499140a74632f64717b837d43e
Files
-
1330a5499140a74632f64717b837d43e.dll windows:4 windows x86 arch:x86
a9547091a06a6a6ef52bf7ac2b9fd79a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetFullPathNameW
SetEndOfFile
GetDiskFreeSpaceExW
GetLogicalDriveStringsW
GetCurrentProcess
DeleteFileW
GetSystemInfo
GetVersionExW
SetFilePointerEx
GetModuleHandleW
GetCurrentThread
GetDriveTypeW
FormatMessageW
GetProcAddress
CreateHardLinkW
GetModuleHandleA
GetVolumeInformationW
GetTimeFormatW
LocalFree
GetFileSizeEx
GetDateFormatW
CloseHandle
GetLastError
CreateFileW
DeviceIoControl
advapi32
LookupAccountSidA
OpenEventLogW
LookupAccountSidW
RevertToSelf
LookupAccountNameW
AdjustTokenPrivileges
AllocateAndInitializeSid
LookupPrivilegeValueW
CheckTokenMembership
CloseEventLog
OpenProcessToken
OpenThreadToken
ImpersonateSelf
ReadEventLogW
EqualSid
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 538B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ