Static task
static1
Behavioral task
behavioral1
Sample
7270e707157ae41960e70b326a9d3b00.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7270e707157ae41960e70b326a9d3b00.dll
Resource
win10v2004-20231215-en
General
-
Target
7270e707157ae41960e70b326a9d3b00
-
Size
6KB
-
MD5
7270e707157ae41960e70b326a9d3b00
-
SHA1
0488a148bda9c04baa832f209b63f2e44f2c282e
-
SHA256
0c6967d4503890d2f4da883b9cc9606eedaaa3fb66d87da864eb25a4af49c686
-
SHA512
3ca1d4da097a8b2edecdc0e96efc03cff05e2e65005a47ad3a60aaf9207b19be16ae12354ece1e8fa8b77783b59ab3b70b13dca36872be1cd72a9ec35e9bfd53
-
SSDEEP
96:Z1FVT0FZqbHTOchRGr7BwIm3HzKPP9wbHicTj0DLx5kn:HT0nuHKchO9pFwbHicTj2Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7270e707157ae41960e70b326a9d3b00
Files
-
7270e707157ae41960e70b326a9d3b00.dll windows:1 windows x86 arch:x86
8748a1c48b1a43af0c2e117390543ad4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wsock32
closesocket
connect
htons
inet_addr
kernel32
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
OpenProcess
Process32First
Process32Next
Sleep
VirtualAllocEx
WinExec
WriteFile
lstrcatA
lstrcmpiA
lstrlenA
Sections
.data Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 782B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE