My_GetBiosPsw
My_GetCachedPsw
My_GetDllInfo
My_GetFoxMailPsw
My_GetIeOutlookPsw
My_GetNtLoginPsw
My_GetScreenSavePsw
Behavioral task
behavioral1
Sample
pwdmana/PswDll.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
pwdmana/PswDll.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
pwdmana/风之铃密码箱.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
pwdmana/风之铃密码箱.exe
Resource
win10v2004-20231222-en
Target
4eeccb3ab6a1bbb82b98298ab52d81ad
Size
929KB
MD5
4eeccb3ab6a1bbb82b98298ab52d81ad
SHA1
5bf90ed73a9f6284005dc45c45bcd9b9b017ab64
SHA256
b38e18f7055a8773a06fc900adf5f8361b12ecdf363f59ab54bd687594e54969
SHA512
7d24279684f35b37962d519e343d25ca1b4008a44d1199779239f0cf6f61d95b91a21937fa33816cc31cd68eda5713f68eb412ed49ddf26ea5a1292c3afaa61c
SSDEEP
24576:RUPxNWPga5LB9uUvDae3XPiTeOFrg011kH6s4UoxojHoNv5o:RmQTuLUX0pFrH1kH6f+jINv5o
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/pwdmana/PswDll.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/pwdmana/PswDll.dll | upx |
static1/unpack001/pwdmana/风之铃密码箱.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/pwdmana/PswDll.dll |
unpack001/pwdmana/风之铃密码箱.exe |
unpack003/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
My_GetBiosPsw
My_GetCachedPsw
My_GetDllInfo
My_GetFoxMailPsw
My_GetIeOutlookPsw
My_GetNtLoginPsw
My_GetScreenSavePsw
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ