shellhook32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
880bd7e9407fddc1b39894a6ce316b613caa30ea542a7ed7663847a6bf38cd44.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
880bd7e9407fddc1b39894a6ce316b613caa30ea542a7ed7663847a6bf38cd44.dll
Resource
win10v2004-20240802-en
General
-
Target
880bd7e9407fddc1b39894a6ce316b613caa30ea542a7ed7663847a6bf38cd44
-
Size
629KB
-
MD5
8d780c511efa61a6c4bc3868c693881c
-
SHA1
ced8b5913165b69ecfa60c685ff249b27cc98420
-
SHA256
880bd7e9407fddc1b39894a6ce316b613caa30ea542a7ed7663847a6bf38cd44
-
SHA512
de9e107990479f7f8aab2caacfeddc4050b4d980e1cbd21d49b8632d7c8ced76d31894ff90fa284d520b50be0f381a4b1981fd7f93df625c05aa3d5354ac7fe8
-
SSDEEP
12288:Gfbbhke/4muo+Bnw5LwJpYnMsJnfpPZiZ9C+i2NOZquu0TgKF:Gfbbhke/4mgBnw5Lc7sJnfpPZiZ9AkOd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 880bd7e9407fddc1b39894a6ce316b613caa30ea542a7ed7663847a6bf38cd44
Files
-
880bd7e9407fddc1b39894a6ce316b613caa30ea542a7ed7663847a6bf38cd44.dll windows:6 windows x86 arch:x86
74b528f7c38d89d89e902aac1297ab7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleFileNameW
FreeLibraryAndExitThread
GetLastError
DisableThreadLibraryCalls
CreateThread
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
SetEndOfFile
WriteConsoleW
CreateFileW
HeapSize
SetStdHandle
GetTimeZoneInformation
HeapReAlloc
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FormatMessageA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LocalFree
GetLocaleInfoEx
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
SetConsoleCtrlHandler
GetFileSizeEx
SetFilePointerEx
GetCurrentThread
GetStdHandle
GetFileType
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
HeapFree
CloseHandle
HeapAlloc
GetTempPathW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
ReadConsoleW
FindClose
FindFirstFileExW
OutputDebugStringW
user32
LoadCursorW
FindWindowW
TranslateMessage
GetMessageW
DefWindowProcW
PostMessageW
DestroyWindow
CreateWindowExW
UnregisterClassW
DispatchMessageW
RegisterClassW
dwmapi
DwmRegisterThumbnail
DwmUnregisterThumbnail
DwmUpdateThumbnailProperties
Sections
.text Size: 536KB - Virtual size: 535KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ