DllInstall
Behavioral task
behavioral1
Sample
87557afed23c24d7d9867917e325b4a679563bcd701a7fe99874bf10442a037cN.dll
Resource
win7-20240903-en
General
-
Target
87557afed23c24d7d9867917e325b4a679563bcd701a7fe99874bf10442a037cN.exe
-
Size
92KB
-
MD5
89c21e4dccee4820c0bc7d78ad2ba5c0
-
SHA1
d9bcf75516b84733ac005cd96fe54f73c28f5c33
-
SHA256
87557afed23c24d7d9867917e325b4a679563bcd701a7fe99874bf10442a037c
-
SHA512
3f4a729f03bca43a5fca45ab588893fe429f957c0c2f0a351498caefb68d9ddce52b385b55f121ac0f852314cbed60de0de05708751262678964debb4c30f366
-
SSDEEP
1536:RJaYOFIols/Cxpz6lotZrU75ctmlrYseImnPxqqPDzwkSIhb0c94McE2B7chOd:RJajaOoC5ZQ7StmaznPpgT20gSPB7ch
Malware Config
Signatures
-
Detects Lobshot family 1 IoCs
resource yara_rule sample family_lobshot -
Lobshot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87557afed23c24d7d9867917e325b4a679563bcd701a7fe99874bf10442a037cN.exe
Files
-
87557afed23c24d7d9867917e325b4a679563bcd701a7fe99874bf10442a037cN.exe.dll windows:5 windows x86 arch:x86
c049eb3e6a65623be6a61b342aa0bb15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetPrivateProfileStringW
Sleep
lstrcpyA
MoveFileExW
GetCurrentProcessId
CreateProcessA
TerminateJobObject
lstrcmpiW
GetTickCount
GetCommandLineW
GetCurrentProcess
TerminateProcess
SetFileAttributesW
ExitProcess
lstrcmpW
SetErrorMode
ExitThread
SetUnhandledExceptionFilter
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
FindClose
TerminateThread
GetWindowsDirectoryW
GetPrivateProfileSectionNamesW
GetVersionExW
WaitForMultipleObjects
EnterCriticalSection
lstrcpynW
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
GetEnvironmentVariableA
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CreateFileMappingA
SetEnvironmentVariableA
GetEnvironmentVariableW
GetCurrentThreadId
ProcessIdToSessionId
WTSGetActiveConsoleSessionId
SetFilePointer
CreateJobObjectW
AssignProcessToJobObject
GetPrivateProfileIntW
WritePrivateProfileStringW
CreateDirectoryW
lstrcmpiA
GlobalUnlock
GetTempFileNameW
lstrcpyW
CopyFileW
CreateProcessW
GetFileSize
LocalFree
GlobalLock
GetProcAddress
CreateThread
CloseHandle
DeleteFileW
GlobalAlloc
lstrcatW
LoadLibraryA
GetLastError
FormatMessageW
GetModuleHandleA
lstrcatA
GetFileAttributesW
CreateFileW
LocalAlloc
WaitForSingleObject
lstrlenA
ResumeThread
VirtualAlloc
WriteFile
lstrlenW
VirtualFree
MoveFileW
ReadFile
user32
GetUserObjectInformationW
GetThreadDesktop
MonitorFromWindow
ToAscii
SetForegroundWindow
PtInRect
OpenDesktopW
MenuItemFromPoint
HiliteMenuItem
ActivateKeyboardLayout
PrintWindow
BringWindowToTop
GetTopWindow
CreateDesktopW
SetWindowLongA
VkKeyScanExA
GetKeyboardState
GetMenuItemCount
SetActiveWindow
SetWindowPos
GetDC
GetMenu
GetWindow
IsClipboardFormatAvailable
GetProcessWindowStation
GetKeyboardLayoutList
PostMessageW
GetWindowRect
SendMessageTimeoutW
SendMessageTimeoutA
ScreenToClient
WindowFromPoint
GetWindowPlacement
IsWindow
CloseDesktop
GetKeyboardLayout
MoveWindow
SetFocus
LoadKeyboardLayoutA
SystemParametersInfoA
GetDesktopWindow
GetParent
IsWindowVisible
SetThreadDesktop
GetWindowLongA
GetWindowTextW
OemToCharA
GetClassNameW
CharLowerA
GetWindowThreadProcessId
FindWindowExW
PostMessageA
FindWindowW
EnumDesktopWindows
OpenClipboard
wvsprintfW
CloseClipboard
EmptyClipboard
wvsprintfA
GetClipboardData
SetClipboardData
wsprintfA
gdi32
DeleteDC
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
CreateDCA
CreatePen
Rectangle
DeleteObject
CreateSolidBrush
GetDeviceCaps
GetDIBits
advapi32
RegSetValueA
GetSidSubAuthorityCount
GetSidSubAuthority
RegQueryValueExW
RegDeleteValueA
RegDeleteValueW
RegOpenKeyExW
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegQueryValueA
RegEnumKeyA
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteW
SHGetFolderPathW
Exports
Exports
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ