Activate
Static task
static1
Behavioral task
behavioral1
Sample
471d77f2af52e8d57c3f575b7fb4b35a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
471d77f2af52e8d57c3f575b7fb4b35a.dll
Resource
win10v2004-20231222-en
General
-
Target
471d77f2af52e8d57c3f575b7fb4b35a
-
Size
28KB
-
MD5
471d77f2af52e8d57c3f575b7fb4b35a
-
SHA1
dc6020f817b2d6e43e790193b3e5ab26a34114aa
-
SHA256
8435a02e9a202f8c8badb2f8a153a03f65dce8f67a99355cae0f75a7ad32476d
-
SHA512
d987ffdd0ad72cace3f94639697a51a637a293f2cd9eeb088a8553e044505eae897d93302b63e561bea4fafb7a8ae479be349e1955d840b080d14d078825aa7a
-
SSDEEP
384:tX8/EleW09YzeD31ZUQRgdTdEebWoDacBTxRg/i3r1F1/Zqy:tXpeW4YzSfUlRdEeCsX+i3/Hqy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 471d77f2af52e8d57c3f575b7fb4b35a
Files
-
471d77f2af52e8d57c3f575b7fb4b35a.dll windows:4 windows x86 arch:x86
48cc11b5eeb642812df5e9171aa6b7ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
WSACleanup
WSAStartup
recv
closesocket
send
gethostbyname
htons
socket
connect
kernel32
CloseHandle
OpenEventA
SetEvent
VirtualQuery
CreateThread
GetTickCount
lstrcatA
lstrlenA
GetWindowsDirectoryA
GetSystemDirectoryA
lstrcmpiA
lstrcpyA
lstrcpynA
GetSystemTime
GlobalFree
GlobalAlloc
lstrcmpA
DeleteFileA
GetTempFileNameA
GetTempPathA
WinExec
GetModuleFileNameA
RtlUnwind
WriteFile
CreateFileA
CreateProcessA
GetLastError
FileTimeToSystemTime
FindClose
FindFirstFileA
GetComputerNameA
Sleep
CreateMutexA
ExitProcess
user32
SetWindowsHookExA
CallNextHookEx
SendMessageA
CharLowerA
wsprintfA
advapi32
RegCreateKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 546B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ