D:\ssprotect\branches\3.x-dev\src\compiler\dex_vmp\loader\build_windows_x86\loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e4c9d4c7daa3e17f6f5e07e777e66e2a98aac436086a55e6cb37c88699d2aa9c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e4c9d4c7daa3e17f6f5e07e777e66e2a98aac436086a55e6cb37c88699d2aa9c.dll
Resource
win10v2004-20240226-en
General
-
Target
e4c9d4c7daa3e17f6f5e07e777e66e2a98aac436086a55e6cb37c88699d2aa9c.dll
-
Size
857KB
-
MD5
780ceecc3eae25af3521dbac4dca882e
-
SHA1
5969d6bd6f5723c4d622aae3f69f4613835509ae
-
SHA256
e4c9d4c7daa3e17f6f5e07e777e66e2a98aac436086a55e6cb37c88699d2aa9c
-
SHA512
ae84b725c502442ccfa5170f56530e29be7c00ece683cf928c3baf88f7419dd121b35f493b9358d12ae8b9557ea3ae777c82ea0d5146ddc795f373fa018582a7
-
SSDEEP
12288:uE4v3i6ytS/QJGG5pfezmJupvJuTEWi2BTtEVTWaSoHw:XSgpfeITEOWVTKoHw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4c9d4c7daa3e17f6f5e07e777e66e2a98aac436086a55e6cb37c88699d2aa9c.dll
Files
-
e4c9d4c7daa3e17f6f5e07e777e66e2a98aac436086a55e6cb37c88699d2aa9c.dll.dll windows:6 windows x86 arch:x86
3b772f7abc66e841cb68eaedce4f2dc1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
HeapFree
OutputDebugStringW
WriteConsoleW
SetEndOfFile
OutputDebugStringA
MultiByteToWideChar
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
ReadFile
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
DecodePointer
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
CloseHandle
GetCurrentThread
GetConsoleMode
ReadConsoleW
SetFilePointerEx
HeapReAlloc
SetConsoleCtrlHandler
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleOutputCP
SetStdHandle
CreateFileW
GetStringTypeW
GetFileSizeEx
Exports
Exports
_JNI_OnLoad@8
_JNI_OnUnload@8
_vm_boolean@16
_vm_byte@16
_vm_char@16
_vm_double@16
_vm_float@16
_vm_init@12
_vm_int@16
_vm_long@16
_vm_object@16
_vm_short@16
_vm_str@12
_vm_void@16
Sections
.text Size: 457KB - Virtual size: 457KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 299KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ