GOODBOY
Behavioral task
behavioral1
Sample
869de5c06db3ad909ea1040215fccc65.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
869de5c06db3ad909ea1040215fccc65.dll
Resource
win10v2004-20231222-en
General
-
Target
869de5c06db3ad909ea1040215fccc65
-
Size
49KB
-
MD5
869de5c06db3ad909ea1040215fccc65
-
SHA1
84723e8a05b2b2e52fd5d07cef40347a69688549
-
SHA256
e55952e6855b4f3806d9fe076d0ac3abe9893739839e1aeaf6830b6c68796a0f
-
SHA512
48590b8742d6f23c8edf90a255749104b38f31d9ffdfac144bca8304c3494352fdeb6e0fb1757fee8c02abf6d3316c6cf77f53cdccb92648c4efd4b0b29b43f5
-
SSDEEP
768:/Ik7++0UOHH+v6A6rXWb4/dI0LJliS6i67N8f5wvggn1mc200SXlB19qCuZDlt:/N7YBIiXWiDJ4zYwvb1ESLNkpt
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 869de5c06db3ad909ea1040215fccc65
Files
-
869de5c06db3ad909ea1040215fccc65.dll windows:4 windows x86 arch:x86
4d09bea009f6d6634165cde7e9582609
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
CloseHandle
GetCurrentProcess
Thread32Next
TerminateThread
GetModuleHandleA
Thread32First
Process32Next
lstrcmpiA
GetProcAddress
CreateToolhelp32Snapshot
ReadFile
ReadProcessMemory
Sleep
CreateProcessA
ExitThread
GetSystemDirectoryA
OutputDebugStringA
WriteProcessMemory
CreateThread
Process32First
user32
SetWindowsHookExA
DispatchMessageA
GetMessageA
TranslateMessage
CallNextHookEx
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
msvcrt
sprintf
strcmp
_except_handler3
memcpy
memcmp
strlen
strcat
strcpy
memset
wininet
HttpSendRequestA
HttpSendRequestW
InternetCloseHandle
HttpOpenRequestA
InternetConnectA
InternetOpenA
ws2_32
WSACleanup
closesocket
send
connect
gethostbyname
inet_addr
htons
socket
WSAStartup
Exports
Exports
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ