ServerMain
Static task
static1
Behavioral task
behavioral1
Sample
3e02d0a00e7f41bc25db65eb9af7f4ed.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e02d0a00e7f41bc25db65eb9af7f4ed.dll
Resource
win10v2004-20231215-en
General
-
Target
3e02d0a00e7f41bc25db65eb9af7f4ed
-
Size
13KB
-
MD5
3e02d0a00e7f41bc25db65eb9af7f4ed
-
SHA1
43d0748a1258c3ecf6a3dc4c81662c336cf8911d
-
SHA256
28c5bb15411d49622b0727876857314f47e85ef9b9966dab36c4959a5629604d
-
SHA512
5958931b7ac1e27be80c7d26a128a25ecf0d40cf43ef964132ee51e92cdf319ea5bbd22e29d856e0010ccd19afe6bff3fecf80385d788ce1206230204412c529
-
SSDEEP
192:cD0GY9E4y1EiWDUcCk1BFisjQ/kKnWE0bcZyL:uqEd24k1ziKunWEby
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e02d0a00e7f41bc25db65eb9af7f4ed
Files
-
3e02d0a00e7f41bc25db65eb9af7f4ed.dll windows:4 windows x86 arch:x86
5a55803254806edfeddb9a378de54549
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
sprintf
strncpy
strstr
memset
_strrev
_stricmp
memcpy
strcmp
strcpy
_access
kernel32
GetCommandLineA
OpenProcess
TerminateProcess
DeleteFileA
GetTempFileNameA
MoveFileExA
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadLibraryA
GetProcAddress
FreeLibrary
CopyFileA
GetFileAttributesA
Sleep
lstrlenA
GetDriveTypeA
CloseHandle
CreateThread
ExitProcess
GetLastError
CreateMutexA
dbghelp
SearchTreeForFile
ws2_32
WSACleanup
socket
htons
htonl
bind
recvfrom
WSAStartup
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 363KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ