Static task
static1
Behavioral task
behavioral1
Sample
de67cabca2d8ada4278021ce5308ae03.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
de67cabca2d8ada4278021ce5308ae03.dll
Resource
win10v2004-20240226-en
General
-
Target
de67cabca2d8ada4278021ce5308ae03
-
Size
4KB
-
MD5
de67cabca2d8ada4278021ce5308ae03
-
SHA1
8587348ffc7a793bc31459f6877c47903e958246
-
SHA256
30010812c6eabec75752b49e6678a5a7816d011c9f968b1ace7eb553d1526bc8
-
SHA512
ea7675ef2ab8ce375f3b4afb803d75295ac4d66427174c31974bdb42fe465a8bbfca5da3d3c67d354191d7de7f2c7cdb0d63818b476db948192a4af702dab6b9
-
SSDEEP
96:Z1ZqtM0/kJMgksho6BUb+UNwbHicTj0D7ckMfHF:Nqt1/Ngk6fUbFwbHicTj2CF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de67cabca2d8ada4278021ce5308ae03
Files
-
de67cabca2d8ada4278021ce5308ae03.dll windows:1 windows x86 arch:x86
f1b36021718468ebb2e82a698c87066b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wsock32
WSAStartup
closesocket
connect
htons
inet_addr
socket
kernel32
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
OpenProcess
Process32First
Process32Next
Sleep
VirtualAllocEx
WinExec
WriteFile
lstrcatA
lstrcmpiA
lstrlenA
Sections
.code Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 822B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 398B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE