_.pdb
Behavioral task
behavioral1
Sample
c104b388704d8d7840a8ba30da0c7b8254dd3343.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c104b388704d8d7840a8ba30da0c7b8254dd3343.dll
Resource
win10v2004-20241007-en
General
-
Target
c104b388704d8d7840a8ba30da0c7b8254dd3343
-
Size
124KB
-
MD5
c9a24cd7e3eb584411a29264be59fa55
-
SHA1
c104b388704d8d7840a8ba30da0c7b8254dd3343
-
SHA256
c493b0e67d6b5e2feadeffe1f7b099711a3c39fd074fb22e3f465b212d776b5b
-
SHA512
952708962815221f2db51d2d82a4e619f638411673b3f0fbc723d90d4fcd9b438e00f5758b2de28ac8b94641d584af3d4c41d191204c2234ebdf1c702843d5f9
-
SSDEEP
3072:E8ia0DxF/4O8qNdcq6AIL6X28OwzyGsV/q1sB:VixDx978qzXOAzyGG/q
Malware Config
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule sample family_sectoprat -
Sectoprat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c104b388704d8d7840a8ba30da0c7b8254dd3343
Files
-
c104b388704d8d7840a8ba30da0c7b8254dd3343.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ