cYreenQilloss
Static task
static1
Behavioral task
behavioral1
Sample
ab102ac51353308b037172dca56d03024a99fcb1d601316fc0c260354a6d867e.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ab102ac51353308b037172dca56d03024a99fcb1d601316fc0c260354a6d867e.dll
Resource
win10v2004-20240426-en
General
-
Target
ab102ac51353308b037172dca56d03024a99fcb1d601316fc0c260354a6d867e
-
Size
4.1MB
-
MD5
e53e7fa2c58ee5a58598d1646eda6c66
-
SHA1
6dec4ccdf4ad454a24477c65642b7d031c55fd81
-
SHA256
ab102ac51353308b037172dca56d03024a99fcb1d601316fc0c260354a6d867e
-
SHA512
ed65c3b730203c379f565601c26de7b7800dada4b1b860ca83fd97c4ca15f3e256494d12015e264f77a74542f396bbe65271f6774e6116cd797c7bc88b0978b7
-
SSDEEP
98304:4G6KqCGavku+jIq+ZV9itdKidBLlzSA8lTA5Mxcq:4GRJH+jIfb9itlBL0joMx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab102ac51353308b037172dca56d03024a99fcb1d601316fc0c260354a6d867e
Files
-
ab102ac51353308b037172dca56d03024a99fcb1d601316fc0c260354a6d867e.dll windows:6 windows x86 arch:x86
02e9b769ad4ff3fa42a2abaf4cbd9b09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
CloseHandle
GetOEMCP
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
HeapAlloc
GetFileType
GetStdHandle
SetFilePointerEx
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
CreateFileW
HeapSize
WriteConsoleW
CreateProcessA
QueryFullProcessImageNameW
ExitProcess
LocalFree
GetLastError
VirtualAlloc
GetCommandLineW
GetCurrentProcess
VirtualFree
HeapFree
GetModuleHandleW
LCMapStringW
GetModuleFileNameW
GetModuleHandleExW
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
InterlockedFlushSList
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ShowWindow
GetForegroundWindow
advapi32
GetTokenInformation
OpenProcessToken
shell32
CommandLineToArgvW
ShellExecuteW
ord680
shlwapi
PathFileExistsA
ws2_32
socket
send
WSAStartup
connect
closesocket
WSACleanup
htons
recv
gethostbyname
Exports
Exports
Sections
.text Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0'~ Size: - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.;IH Size: 1024B - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MRK Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ