Entry
Static task
static1
Behavioral task
behavioral1
Sample
25bf3d9b5e7c1060d0fb74457e22d5f1544d25eb418b3035526a5336fae12802.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25bf3d9b5e7c1060d0fb74457e22d5f1544d25eb418b3035526a5336fae12802.dll
Resource
win10v2004-20240226-en
General
-
Target
25bf3d9b5e7c1060d0fb74457e22d5f1544d25eb418b3035526a5336fae12802
-
Size
355KB
-
MD5
6d588ebbff17019117bfc8a45f6aade4
-
SHA1
58695f15109ef226158137c4ec091c335cfe2a36
-
SHA256
25bf3d9b5e7c1060d0fb74457e22d5f1544d25eb418b3035526a5336fae12802
-
SHA512
ffaf4e3a52d45f0b6a84536ceebd1dcb5920360a8b4131f1a7d92df401cdebcf4a85d80d6d9e6246294993668673e71253557264752ae1af45e311bb8971e483
-
SSDEEP
6144:ni/pzrmWGEb3OJYsVEbPwZOVhkURwWAo1Ho0AUKPSjy/6lS1E:ny9393oMs1WAiHobPSqAS1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25bf3d9b5e7c1060d0fb74457e22d5f1544d25eb418b3035526a5336fae12802
Files
-
25bf3d9b5e7c1060d0fb74457e22d5f1544d25eb418b3035526a5336fae12802.dll windows:4 windows x86 arch:x86
587f02dfc56a9e4a4797622d92ebcd08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
free
strncmp
realloc
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
??2@YAPAXI@Z
??3@YAXPAX@Z
rand
memcmp
memmove
memcpy
memset
malloc
kernel32
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
GetProcAddress
DeleteCriticalSection
QueryPerformanceFrequency
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrlenA
CreateDirectoryW
WaitForSingleObject
lstrlenW
lstrcmpiA
lstrcmpA
MoveFileExW
GetSystemTimeAsFileTime
LoadLibraryW
GetModuleFileNameW
CloseHandle
DeleteFileW
lstrcpyW
SetEvent
WriteFile
GetFileAttributesW
ReadFile
CreateFileW
GetFileSizeEx
GetSystemTime
MapViewOfFile
UnmapViewOfFile
VirtualQuery
QueryPerformanceCounter
lstrcmpW
CreateFileMappingW
VirtualProtect
GetFileTime
CreateThread
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
lstrcmpiW
FreeEnvironmentStringsW
GetShortPathNameW
SystemTimeToFileTime
Sleep
lstrcpynW
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalLock
GetModuleHandleW
GlobalUnlock
IsDebuggerPresent
GetModuleHandleA
CreateEventW
ResetEvent
lstrcpyA
GetLocalTime
user32
SetWindowTextW
GetWindowTextW
GetClassNameW
CloseClipboard
IsClipboardFormatAvailable
FindWindowW
GetKeyboardState
wsprintfA
GetKeyboardLayout
GetAsyncKeyState
GetClipboardData
SetWindowLongW
FindWindowExW
OpenClipboard
CallWindowProcW
ToUnicodeEx
wsprintfW
CharUpperA
CharUpperW
FindWindowExA
shell32
ShellExecuteA
SHGetFolderPathW
ws2_32
send
closesocket
ioctlsocket
WSAGetLastError
inet_addr
bind
listen
accept
WSAStartup
htons
gethostbyname
recv
socket
connect
iphlpapi
GetAdaptersInfo
advapi32
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
Exports
Exports
Sections
.text Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ