Static task
static1
Behavioral task
behavioral1
Sample
cf3436921ef23deb52635152c19b015ee47448c248da8032b5aa7fa780f0daea.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
cf3436921ef23deb52635152c19b015ee47448c248da8032b5aa7fa780f0daea.dll
Resource
win10v2004-20240508-en
General
-
Target
cf3436921ef23deb52635152c19b015ee47448c248da8032b5aa7fa780f0daea
-
Size
132KB
-
MD5
279d41135ffd20be0118f5c823741ed9
-
SHA1
8ba18bf9e9f15ba494f16e2d5ae733ebc6784d1b
-
SHA256
cf3436921ef23deb52635152c19b015ee47448c248da8032b5aa7fa780f0daea
-
SHA512
51b41e8f02c9e769d3ec8c3fec56889af9f202da6bbabfaf9afe06c4773e1e8b02c2fb0b79106c708b9a14d0fc7bb5e34b337af68383f0f5f58bbaa67ade43cd
-
SSDEEP
1536:bWdNUZiL33d34x0s5tG9b0Zlw5OOmcsZQ5Cs0V+mqToGkh8AI1QhY:IiZiL94qs5tKPOOnUQ0V+UGs9y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf3436921ef23deb52635152c19b015ee47448c248da8032b5aa7fa780f0daea
Files
-
cf3436921ef23deb52635152c19b015ee47448c248da8032b5aa7fa780f0daea.dll windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Sections
.text Size: 522KB - Virtual size: 522KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ