E:\Jenkins\workspace\Osprey\Osprey_5.01\output\app\symbol\Win32\Release\TmopphDns.pdb
Static task
static1
Behavioral task
behavioral1
Sample
238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.dll
Resource
win7-20240221-en
General
-
Target
238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.zip
-
Size
452KB
-
MD5
93d8943653f76827c5ee564636c5e3db
-
SHA1
66460143a0df5e8fb2bbef0880079dbb6aacf368
-
SHA256
9c1e11dfb2cf7d64c4dceddda82c9e675b2e66bd34ab6f6a6e646404490e5378
-
SHA512
9b7e8a0d933786043b093ef07a9416e68796812e406aab584bcff35bb32eebe4e64bea90a57a856fbc04e3b7e650cbb6912970cc93a69199b2268f9629635a4e
-
SSDEEP
12288:NM5JwsrrcquL1nE1u8JHj0wG1dFmPJjgU5v:iTrzuhnE1DFAwOOhjL9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.dll
Files
-
238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.zip.zip
Password: infected
-
238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.dll.dll windows:6 windows x86 arch:x86
Password: infected
55f1ba0b782341fa929d61651ef47f0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
WideCharToMultiByte
CreateDirectoryA
Sleep
LocalFree
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
WriteConsoleW
GetProcAddress
ResetEvent
CloseHandle
LoadLibraryA
SetEvent
GetLastError
MultiByteToWideChar
OpenEventW
GetModuleFileNameW
GetShortPathNameW
SetLastError
OpenEventA
GetModuleFileNameA
GetShortPathNameA
EnterCriticalSection
GetVersionExA
HeapSize
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
FormatMessageW
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
CreateFileW
GetFileType
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetCurrentThread
GetFileAttributesExW
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
SetEndOfFile
ReadFile
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
FlushFileBuffers
DeleteFileW
HeapReAlloc
SetConsoleCtrlHandler
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
OutputDebugStringW
advapi32
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
UnregisterTraceGuids
RegisterTraceGuidsA
GetSecurityDescriptorSacl
SetEntriesInAclA
GetSecurityDescriptorDacl
SetNamedSecurityInfoA
ConvertStringSecurityDescriptorToSecurityDescriptorA
TraceMessage
GetNamedSecurityInfoA
SetSecurityInfo
ConvertStringSidToSidA
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
SHGetFolderPathW
ole32
CoTaskMemFree
Exports
Exports
TmphCreateCtx
TmphCreateCtxEx
TmphDisconnectAllSessions
TmphExit
TmphFreeContext
GetModuleProp
TmphInit
TmphIsSupport
GetModul
GetModuleP
HetModuleProp
GetModulePro
Sections
.text Size: 504KB - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ