Behavioral task
behavioral1
Sample
c2718539b48202c39c3247ebc8abafed.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2718539b48202c39c3247ebc8abafed.dll
Resource
win10v2004-20240226-en
General
-
Target
c2718539b48202c39c3247ebc8abafed
-
Size
260KB
-
MD5
c2718539b48202c39c3247ebc8abafed
-
SHA1
583fc2f9f2987f419bd100cc26f6a4e84e31df53
-
SHA256
778fa378eff1a1e800308ee3b282c9133dd1cf83d6bf75c6553a2e78b3a62150
-
SHA512
4216e020ee7489049218802d23ad756efeb2a86bf5ea9304d24fa2c5506f95b5324ad8b553506e42557f96497e31f247f6537dc49e7bc59092a362b9e66b2b19
-
SSDEEP
6144:Q/Mq3Bw63swv82OnMpw6xLhhw9zYKcSB2Pq:Q/MMe63swvxAMpwA1hsKP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2718539b48202c39c3247ebc8abafed
Files
-
c2718539b48202c39c3247ebc8abafed.dll windows:4 windows x86 arch:x86
1b29e761e47e162ed62dec288db6e2b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeEnvironmentStringsA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetWindowThreadProcessId
MessageBoxW
Sections
.text Size: - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ