C:\Users\antho\Downloads\CS2-main (1)\CS2-main\build\Release\cstrike.pdb
Static task
static1
Behavioral task
behavioral1
Sample
pastehook hackvshack.net.dll
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral2
Sample
pastehook hackvshack.net.dll
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
pastehook hackvshack.net.dll
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
pastehook hackvshack.net.dll
Resource
debian9-mipsel-20240226-en
General
-
Target
pastehook hackvshack.net.dll
-
Size
1.9MB
-
MD5
4290db4663cfdf40abf98de890c37358
-
SHA1
4f5d79a42242aedc824811fe54b59104155e156f
-
SHA256
4f11e045e95571d97bf2ed7d0f54e3ff3835ea5a19ad25c53512dc0f1794d169
-
SHA512
29bb2b1c538da401f7f9f30212624a9c59a702564ab4161f9d16a363dfe77a62098e7fd9f9c38ba46c4bc50eb8ae8f6f0669a8c320f6ea79ca041e43a3b42e4c
-
SSDEEP
24576:dyWjfk+dG4C9G5isKK7ZszwfR0ZWVOm9UAxsH7tgX7uyOK7hsEZyTRXnSkIJ+4:bq4gxsbLfRIWVNbxyO7iK7Khn2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource pastehook hackvshack.net.dll
Files
-
pastehook hackvshack.net.dll.dll windows:6 windows x64 arch:x64
04a2a040cb323b5344376d08b082e301
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
winmm
PlaySoundW
kernel32
WideCharToMultiByte
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
FreeLibrary
QueryPerformanceCounter
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapCreate
VirtualProtect
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
Sleep
HeapReAlloc
CloseHandle
HeapAlloc
HeapDestroy
GetThreadContext
GetCurrentProcessId
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
CreateDirectoryW
FreeLibraryAndExitThread
GetLastError
CreateThread
ReadFile
FindFirstFileW
FindNextFileW
WriteFile
SetFilePointer
SetEndOfFile
FindClose
CreateFileW
DeleteFileW
GetFileSize
GetCommandLineW
TryAcquireSRWLockExclusive
FreeEnvironmentStringsW
GlobalLock
GetConsoleWindow
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFileType
GetStdHandle
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableW
HeapSize
GlobalFree
SetLastError
RtlUnwind
InterlockedFlushSList
GlobalAlloc
MultiByteToWideChar
GetCommandLineA
AcquireSRWLockExclusive
GetEnvironmentStringsW
WriteConsoleW
ReleaseSRWLockExclusive
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
user32
EmptyClipboard
CloseClipboard
GetClipboardData
SetClipboardData
ClientToScreen
GetCursorPos
MessageBoxW
GetWindowThreadProcessId
GetWindow
IsWindowVisible
SetWindowLongPtrW
EnumWindows
GetSystemMetrics
CallWindowProcW
GetAsyncKeyState
GetKeyState
GetMessageExtraInfo
ScreenToClient
GetCapture
TrackMouseEvent
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
IsWindowUnicode
ReleaseCapture
SetCursorPos
OpenClipboard
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
imm32
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmReleaseContext
ImmGetContext
d3dcompiler_47
D3DCompile
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512KB - Virtual size: 511KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 161KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ