c:\millionbat\eightObserve\ShowLight\Circlesell\base.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e298ef044baada7fadb47e9b722197896b4dafa18313de9a40bf96755148e614.dll
Resource
win7-20240221-en
General
-
Target
aebf64159ae48037d8a2760a291df93f
-
Size
95KB
-
MD5
aebf64159ae48037d8a2760a291df93f
-
SHA1
4f40b00f26420bbcb6b6966b257db00c7e29d4ad
-
SHA256
a0a2c1bcf4275e486c1c385eda0ecf58718f52061d29bea7192f0a2af3005709
-
SHA512
0a5ba4006d6e94f1663ee3dbf66b2cdbfbe85973b53ef4de88bed08b49d9da7eebf47eedb0438b8de47628f0ca05eacd6e5635cb4838a314cc4b8c39b73bb63b
-
SSDEEP
1536:kgxBlDdE8gaVncuTrPzZSj+/4+Ff2f7gR8sOBUep2w7T1YJGvj2u8MQN6YZgy57H:U8Z1j47ga95f/L/8iYWFJW9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/e298ef044baada7fadb47e9b722197896b4dafa18313de9a40bf96755148e614
Files
-
aebf64159ae48037d8a2760a291df93f.zip
Password: infected
-
e298ef044baada7fadb47e9b722197896b4dafa18313de9a40bf96755148e614.dll regsvr32 windows:6 windows x86 arch:x86
b5b22dfae1a1ccf696c4aff6f4bd90f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FindFirstChangeNotificationW
TlsGetValue
GetCPInfo
GetSystemTimeAsFileTime
Sleep
SetSystemPowerState
GetModuleFileNameW
VirtualProtectEx
RemoveDirectoryW
TlsAlloc
CloseHandle
GetLastError
HeapFree
HeapAlloc
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineA
GetCurrentThreadId
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
SetLastError
MultiByteToWideChar
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetProcAddress
WideCharToMultiByte
GetStdHandle
WriteFile
HeapSize
GetTimeZoneInformation
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
CompareStringW
LCMapStringW
LoadLibraryExW
OutputDebugStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
SetStdHandle
SetFilePointerEx
WriteConsoleW
CreateFileW
Exports
Exports
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ