c:\LoneBox\Fattube\FruitHole\Row.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0a905cb733a72dc8a3a2d4b744653d5697cfe86a0fb481ea9db8b8f60dc3a1f7.dll
Resource
win7-20240903-en
General
-
Target
34384f226cd2e1e9d3feef9befdec2413abb8df59f1af245504810e61b3910b0.zip
-
Size
607KB
-
MD5
361fbf74c957e1bde0048cc8bcbbd07d
-
SHA1
72f4326b6830921b47b71f796746c28d955fa7a3
-
SHA256
34384f226cd2e1e9d3feef9befdec2413abb8df59f1af245504810e61b3910b0
-
SHA512
a35c1117e0cb27688cf70e2aafa3487ee0b6f911829bddf7449265a74c2cf3ccfc0b45717baf6d0f22b61de30ef4f99cc89941f7b77135945bee5ef92a9dbb93
-
SSDEEP
12288:9I+UXG6+839uDyK8AteiJMGtdmXu1Pr8EUtJj0Tnf5Km7oVZ+RblbL:S+mGhiuDyEeKMgdmXqrdMdSnsDoBbL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0a905cb733a72dc8a3a2d4b744653d5697cfe86a0fb481ea9db8b8f60dc3a1f7.dll
Files
-
34384f226cd2e1e9d3feef9befdec2413abb8df59f1af245504810e61b3910b0.zip.zip
Password: infected
-
0a905cb733a72dc8a3a2d4b744653d5697cfe86a0fb481ea9db8b8f60dc3a1f7.dll.dll regsvr32 windows:6 windows x86 arch:x86
f4f63e9c9e54a0497e774f15ebdcf087
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Sleep
FlushFileBuffers
GetModuleHandleA
EnterCriticalSection
SetFileAttributesA
IsBadReadPtr
GetLocaleInfoA
WriteConsoleW
InitializeCriticalSection
SetErrorMode
VirtualProtect
LocalFree
LocalAlloc
GlobalFree
CreateProcessA
GlobalAlloc
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
CloseHandle
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
ReadConsoleW
HeapSize
CreateFileW
cryptui
CryptUIWizExport
CryptUIDlgViewCertificateA
CryptUIWizFreeDigitalSignContext
CryptUIWizDigitalSign
CryptUIDlgSelectCertificateFromStore
CryptUIDlgViewContext
CryptUIWizImport
Exports
Exports
DllRegisterServer
Wentsegment
Sections
.text Size: 485KB - Virtual size: 485KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ