pidgenx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cc384fddda4f3d024eae44ad9345d79c12633e777992a2d0e4e173118a58038c.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cc384fddda4f3d024eae44ad9345d79c12633e777992a2d0e4e173118a58038c.dll
Resource
win10v2004-20240226-en
General
-
Target
cc384fddda4f3d024eae44ad9345d79c12633e777992a2d0e4e173118a58038c
-
Size
1.6MB
-
MD5
b549e4655a585236e0002bfd9fe98dbb
-
SHA1
6c218982e2ecec83aae297f1cdefae1049a9ec03
-
SHA256
cc384fddda4f3d024eae44ad9345d79c12633e777992a2d0e4e173118a58038c
-
SHA512
30ac26d20089c69d86822bd7672f48597f2b3b0b11ddb0f052660af5a08a39057b755f4ccf67f4258627aff10c1d2e273ba3335fd046abe331e6fa2da79a3dc7
-
SSDEEP
49152:V6OsrXBLAa22bGwTnnSs/nnHxT88Zyag6KV3:V6lOSjfHZZyaK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc384fddda4f3d024eae44ad9345d79c12633e777992a2d0e4e173118a58038c
Files
-
cc384fddda4f3d024eae44ad9345d79c12633e777992a2d0e4e173118a58038c.dll windows:6 windows x86 arch:x86
d9cce9cac67215391da3d888c5137316
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_onexit
_lock
__dllonexit
_unlock
memmove
memcpy
_amsg_exit
_initterm
free
malloc
_XcptFilter
_wcsicmp
_purecall
_vsnwprintf
rand
srand
time
wcsncmp
_wtoi
_wcsnicmp
_ui64tow
_itow
wcsstr
wcschr
memset
kernel32
InterlockedExchangeAdd
CreateEventW
CreateSemaphoreW
VirtualQuery
ReleaseSemaphore
SetEvent
WaitForSingleObject
GetModuleFileNameW
GetCurrentThread
GetThreadPriority
GetProcessAffinityMask
RaiseException
UnmapViewOfFile
GetSystemInfo
VirtualProtect
FreeLibrary
LoadLibraryW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FreeLibraryAndExitThread
VirtualFree
VirtualAlloc
FileTimeToSystemTime
GetSystemDefaultLangID
GetVersionExW
HeapAlloc
GetProcessHeap
HeapFree
InterlockedIncrement
InterlockedDecrement
LocalFree
CloseHandle
GetLastError
GetVersionExA
LocalAlloc
WideCharToMultiByte
MultiByteToWideChar
SetFilePointer
ReadFile
GetFileSize
CreateFileW
SetLastError
InterlockedExchange
Sleep
InterlockedCompareExchange
RtlUnwind
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
GetVersion
SetThreadPriority
WaitForMultipleObjects
CreateThread
MapViewOfFile
CreateFileMappingW
SystemTimeToFileTime
GetLocalTime
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
advapi32
TraceEvent
CryptGenKey
CryptExportKey
CryptVerifySignatureA
CryptSignHashA
CryptImportKey
CryptDecrypt
CryptEncrypt
CryptDestroyKey
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptAcquireContextW
CryptGenRandom
TraceMessage
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
CryptReleaseContext
rpcrt4
UuidToStringW
I_RpcMapWin32Status
RpcStringFreeW
UuidFromStringW
Exports
Exports
PidGenX
PidGenX2
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 391KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ