J:\Bla\Omdihars Multihack\Release\Omdihars Multihack.pdb
Behavioral task
behavioral1
Sample
29.05 xtrap/XTrap Bypass.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29.05 xtrap/XTrap Bypass.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
29.05 xtrap/XTrap Bypass.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
29.05 xtrap/XTrap Bypass.exe
Resource
win10v2004-20240226-en
General
-
Target
ab524bcb0f23419ece429ea5ade20457
-
Size
17KB
-
MD5
ab524bcb0f23419ece429ea5ade20457
-
SHA1
f21ea260e9290bcf0a5d9b7d61ac27c7dcf49bdc
-
SHA256
510fd114960de33ffc19d35862cb618fe5bf8d9dc6ba2356126a4cef7e950446
-
SHA512
221d72e5ec190bbc2a92b2b9a64aa78db6bf27b43f00e242c42a7c4cc10b65ef672b0f169c26e26f0f59428fea614b11f8651cecd00996fcf5a7946ef8d08abd
-
SSDEEP
384:qS/RocfLrM1VbqxWeY+iUpknw6lonSSkbpT4oXFOQN+wuj:qKu3WDkw6+SjlkQN8
Malware Config
Signatures
-
resource yara_rule static1/unpack001/29.05 xtrap/XTrap Bypass.dll aspack_v212_v242 -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/29.05 xtrap/XTrap Bypass.dll unpack001/29.05 xtrap/XTrap Bypass.exe
Files
-
ab524bcb0f23419ece429ea5ade20457.rar
-
29.05 xtrap/XTrap Bypass.dll.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
29.05 xtrap/XTrap Bypass.exe.exe windows:5 windows x86 arch:x86
c82cd061c3318ed60ab0a811d577aac5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameA
GetCurrentProcess
GetModuleHandleW
CreateRemoteThread
OpenProcess
Sleep
GetProcAddress
VirtualAllocEx
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CloseHandle
WriteProcessMemory
GetSystemTimeAsFileTime
GetCurrentProcessId
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
EncodePointer
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleA
VirtualProtectEx
WaitForSingleObject
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
user32
MessageBeep
msvcp100
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
shlwapi
StrStrIW
msvcr100
?terminate@@YAXXZ
_unlock
__dllonexit
_crt_debugger_hook
_onexit
_except_handler4_common
_invoke_watson
_controlfp_s
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
__initenv
exit
_XcptFilter
_exit
_cexit
__getmainargs
printf
memset
memcpy
_lock
strlen
_amsg_exit
__CxxFrameHandler3
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ