VMCALL
Static task
static1
Behavioral task
behavioral1
Sample
0x0007/dvm.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0x0007/dvm.dll
Resource
win10v2004-20231215-en
General
-
Target
77d93a85fba8afb5ae371a90fd6a5f22
-
Size
4.3MB
-
MD5
77d93a85fba8afb5ae371a90fd6a5f22
-
SHA1
ebc18e8163cb2ffc709a717b0fb7a1f077e44a6c
-
SHA256
e7106173ddb68b3664178275520f9fa2f5c7033e38056dea0a3440aee1b55849
-
SHA512
07aeb3fdb660b43ac098c8deac701360df40115d233d1ba11a9fb1b54474b0f3f338a7968bbe6d08ad4f2582f03d046242e4c9044267a9bb9538ff93a5cafcd1
-
SSDEEP
98304:Gh+gXcjOp9hjIGwY/9bpGaxbPASoThEfX6zRhDS0d:Gh+fdaD0RlLd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0x0007/dvm.dll
Files
-
77d93a85fba8afb5ae371a90fd6a5f22.rar
-
0x0007/dvm.dll.dll windows:5 windows x86 arch:x86
d6e8ddca151a5fdce36f63bedbd725e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtect
CreateFileA
GetFileSize
SetFilePointer
GetLastError
VirtualAlloc
GetModuleFileNameA
CloseHandle
GetProcAddress
GetModuleHandleA
ExitProcess
ReadFile
VirtualFree
user32
MessageBoxA
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1009B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RLD0 Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.RLD1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ