c:\buildslave\steam_rel_client_win32\build\src\streaming\Release\streaming_client.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_e91490e5ad10acfde1a305e47c3c2871_avoslocker_qakbot_revil.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-15_e91490e5ad10acfde1a305e47c3c2871_avoslocker_qakbot_revil.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-15_e91490e5ad10acfde1a305e47c3c2871_avoslocker_qakbot_revil
-
Size
9.5MB
-
MD5
e91490e5ad10acfde1a305e47c3c2871
-
SHA1
dd1dd6957d5d1ca3a786c07058e6ce367db28c37
-
SHA256
3f36679dbb954bb10ac85151105d0fa5bb927cf0eef083622c163fca43edf166
-
SHA512
25fae4ac6d02f3d1e425c0c861e87bcec9f420692f23be80d7f68e8adf4209f651e46535f305bd15a4a96ed19f4a9a776b0800ca6ff502c54af8961563416cc1
-
SSDEEP
196608:rx0Zfe3TjrxJBhQYfp0yK2NJEP7v2i2VVd2moFK:r6Zfe3TLQY6y9ETvv20mI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-15_e91490e5ad10acfde1a305e47c3c2871_avoslocker_qakbot_revil
Files
-
2024-06-15_e91490e5ad10acfde1a305e47c3c2871_avoslocker_qakbot_revil.exe windows:6 windows x86 arch:x86
bf14c1a2da6a03b257dd50d3e2b6401e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetCurrentProcessId
GetModuleFileNameW
GlobalAlloc
GlobalUnlock
LocalFree
MoveFileExW
VerifyVersionInfoW
MultiByteToWideChar
RaiseException
GetCurrentThread
SetThreadPriority
WideCharToMultiByte
SetLastError
WriteFile
GlobalLock
GetFullPathNameW
DeleteFileW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
CreateDirectoryW
VerSetConditionMask
GlobalFree
GetFileAttributesW
FindFirstFileW
FindClose
CreateFileW
OutputDebugStringA
FormatMessageA
GetCurrentThreadId
GetCurrentProcess
WaitForMultipleObjects
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
GetLastError
LeaveCriticalSection
EnterCriticalSection
DeviceIoControl
GetModuleHandleA
OpenProcess
GetExitCodeProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
IsValidCodePage
HeapReAlloc
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetTimeZoneInformation
HeapValidate
HeapSize
SetFilePointerEx
SetConsoleCtrlHandler
GetConsoleOutputCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetModuleHandleExW
FreeLibraryAndExitThread
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
CreateEventW
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
GetStringTypeW
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
InitializeSRWLock
GetCurrentDirectoryW
FindNextFileW
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
LoadLibraryExA
GetStdHandle
GetEnvironmentVariableW
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
QueryPerformanceCounter
GetSystemTimeAsFileTime
FormatMessageW
ConvertFiberToThread
ConvertThreadToFiber
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount
InitializeCriticalSectionEx
QueryPerformanceFrequency
GetSystemDirectoryW
LoadLibraryW
WaitForSingleObjectEx
CompareFileTime
GetEnvironmentVariableA
ReadFile
PeekNamedPipe
SleepEx
ExitProcess
GetSystemTime
SystemTimeToFileTime
InitializeCriticalSection
GetCommandLineW
TerminateProcess
GlobalMemoryStatusEx
VirtualAlloc
GetModuleFileNameA
LocalAlloc
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
HeapSetInformation
HeapLock
HeapUnlock
HeapWalk
HeapQueryInformation
GetProcessAffinityMask
DuplicateHandle
TryEnterCriticalSection
SwitchToThread
CreateThread
OpenThread
GetExitCodeThread
SetThreadAffinityMask
SetUnhandledExceptionFilter
LoadLibraryExW
ExitThread
DebugBreak
GetProcessHeaps
SetProcessAffinityMask
SetEnvironmentVariableW
FindFirstFileExW
FlushFileBuffers
GetDiskFreeSpaceA
GetDriveTypeW
GetFileAttributesExW
GetFileInformationByHandle
GetFileSizeEx
SetEndOfFile
SetFilePointer
SetFileTime
GetDateFormatW
GetTimeFormatW
user32
CloseClipboard
OpenClipboard
GetDesktopWindow
GetDlgItemInt
EnumWindows
GetWindowRect
SetDlgItemInt
GetDlgItem
EndDialog
SetClipboardData
SetWindowPos
wsprintfA
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowThreadProcessId
EmptyClipboard
IsWindowVisible
GetWindowTextLengthA
DialogBoxParamA
MessageBoxA
FlashWindowEx
SetDlgItemTextA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
shell32
CommandLineToArgvW
ole32
CLSIDFromString
oleaut32
VariantClear
ws2_32
__WSAFDIsSet
select
getsockname
htonl
WSAEnumNetworkEvents
WSAEventSelect
WSASendTo
WSAGetLastError
freeaddrinfo
ntohl
WSACleanup
getsockopt
ntohs
recv
send
WSASetLastError
accept
connect
listen
WSACloseEvent
WSACreateEvent
WSAIoctl
getpeername
WSAStartup
socket
setsockopt
sendto
recvfrom
htons
ioctlsocket
closesocket
bind
gethostname
getaddrinfo
psapi
GetProcessMemoryInfo
winmm
timeEndPeriod
timeBeginPeriod
bcrypt
BCryptGenRandom
wldap32
ord27
ord301
ord147
ord133
ord79
ord142
ord26
ord117
ord41
ord208
ord216
ord14
ord46
ord219
ord145
ord167
ord127
crypt32
CertCloseStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreW
CertEnumCertificatesInStore
Exports
Exports
CreateInterface
g_dwDllEntryThreadId
Sections
.text Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 606KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 752KB - Virtual size: 756KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE