c:\buildslave\steam_rel_client_win32\build\src\streaming\Release\streaming_client.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_95d872d5603e38d1d107cbb06984606c_avoslocker_qakbot_revil.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-24_95d872d5603e38d1d107cbb06984606c_avoslocker_qakbot_revil.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_95d872d5603e38d1d107cbb06984606c_avoslocker_qakbot_revil
-
Size
9.6MB
-
MD5
95d872d5603e38d1d107cbb06984606c
-
SHA1
cbd1e153a0048280df79ed8d8517a662777aa5a2
-
SHA256
87f22aeffec232b9138cf5321b1a016aefeef8c90410f6fb6f877ed7c2e0185f
-
SHA512
2dee70e7e6e53f55921185cf96b1fff3618ddf03a3ce2789e7c40d63ea67f81119328d84374ea22c31c3790aaaf543a9dd10a88cffcbcaa14194537a5b373ed9
-
SSDEEP
196608:pg0ZfLbi5SRj0/AbZpV2NJEP7NMpSB6XjmyOu:p9ZfLF0/ojeETNpB6zmyO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-24_95d872d5603e38d1d107cbb06984606c_avoslocker_qakbot_revil
Files
-
2024-08-24_95d872d5603e38d1d107cbb06984606c_avoslocker_qakbot_revil.exe windows:6 windows x86 arch:x86
31417e24873994fca539d3a86d463533
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalAlloc
GlobalUnlock
GlobalLock
LocalAlloc
LocalFree
MoveFileExW
VerifyVersionInfoW
RaiseException
GetCurrentThread
WideCharToMultiByte
GetModuleFileNameW
GetCurrentProcessId
Sleep
GetFullPathNameW
DeleteFileW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
SetLastError
WriteFile
SetThreadPriority
CreateDirectoryW
VerSetConditionMask
GlobalFree
GetFileAttributesW
FindFirstFileW
FindClose
CreateFileW
OutputDebugStringA
FormatMessageA
GetCurrentThreadId
GetCurrentProcess
WaitForMultipleObjects
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
GetLastError
LeaveCriticalSection
EnterCriticalSection
DeviceIoControl
GetModuleHandleA
OpenProcess
GetExitCodeProcess
CloseHandle
FreeLibrary
LoadLibraryA
MultiByteToWideChar
GetProcAddress
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetTimeZoneInformation
HeapValidate
HeapSize
SetFilePointerEx
SetConsoleCtrlHandler
GetConsoleOutputCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
CreateEventW
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
GetStringTypeW
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
InitializeSRWLock
GetTimeFormatW
GetDateFormatW
SetFileTime
SetFilePointer
GetCurrentDirectoryW
FindNextFileW
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
LoadLibraryExA
GetStdHandle
GetEnvironmentVariableW
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
QueryPerformanceCounter
GetSystemTimeAsFileTime
FormatMessageW
ConvertFiberToThread
ConvertThreadToFiber
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount
InitializeCriticalSectionEx
QueryPerformanceFrequency
GetSystemDirectoryW
LoadLibraryW
WaitForSingleObjectEx
CompareFileTime
GetEnvironmentVariableA
ReadFile
PeekNamedPipe
SleepEx
ExitProcess
GetSystemTime
SystemTimeToFileTime
InitializeCriticalSection
GetCommandLineW
TerminateProcess
GlobalMemoryStatusEx
VirtualAlloc
GetModuleFileNameA
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
HeapSetInformation
HeapLock
HeapUnlock
HeapWalk
HeapQueryInformation
GetProcessAffinityMask
DuplicateHandle
TryEnterCriticalSection
SwitchToThread
CreateThread
OpenThread
GetExitCodeThread
SetThreadAffinityMask
SetUnhandledExceptionFilter
LoadLibraryExW
DebugBreak
GetProcessHeaps
SetProcessAffinityMask
SetEnvironmentVariableW
FindFirstFileExW
FlushFileBuffers
GetDiskFreeSpaceA
GetDriveTypeW
GetFileAttributesExW
GetFileInformationByHandle
GetFileSizeEx
SetEndOfFile
user32
OpenClipboard
SetDlgItemTextA
GetDlgItemInt
GetDesktopWindow
GetWindowRect
SetDlgItemInt
GetDlgItem
EndDialog
DialogBoxParamA
CloseClipboard
wsprintfA
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
IsWindowVisible
EmptyClipboard
SetWindowPos
GetWindowTextLengthA
FlashWindowEx
SetClipboardData
EnumWindows
GetWindowThreadProcessId
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
shell32
CommandLineToArgvW
ole32
CLSIDFromString
oleaut32
VariantClear
ws2_32
__WSAFDIsSet
select
getsockname
htonl
WSAEnumNetworkEvents
WSAEventSelect
WSASendMsg
WSAGetLastError
freeaddrinfo
ntohl
WSACleanup
getsockopt
ntohs
recv
send
WSASetLastError
accept
connect
listen
WSACloseEvent
WSACreateEvent
WSAIoctl
getpeername
WSAStartup
socket
setsockopt
sendto
recvfrom
htons
ioctlsocket
closesocket
bind
gethostname
getaddrinfo
psapi
GetProcessMemoryInfo
winmm
timeEndPeriod
timeBeginPeriod
bcrypt
BCryptGenRandom
wldap32
ord27
ord301
ord147
ord133
ord79
ord142
ord26
ord117
ord41
ord208
ord216
ord14
ord46
ord219
ord145
ord167
ord127
crypt32
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreW
Exports
Exports
CreateInterface
g_dwDllEntryThreadId
Sections
.text Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 606KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 752KB - Virtual size: 756KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE