Scan Result:
FL Keys_x64.dll
Sample Information
| SHA256 | |
| Sample Name | |
| File Size |
4.0 MB 4244712 Bytes |
| First Seen |
2025-02-03 04:56 UTC+0000 8 months, 4 weeks ago. |
General
| MIME Type | |
| MD5 Hash | |
| Architecture | x86-64 (PE32+) |
| Compile Time |
2024-12-13 03:19 10 months, 2 weeks ago. |
| Image Base |
0x400000
|
| Entry Point |
0x32ae80
|
File Meta Data
| Company Name | |
| File Version | |
| Legal Copyright | |
| Product Name | |
| Product Version |
Important Imports
- UnhookWindowsHookEx
- CallNextHookEx
- SuspendThread
- VirtualAlloc
- ResumeThread
- GetDesktopWindow
- GetClipboardFormatNameW
- GetClipboardData
- RegOpenKeyExW
- RegQueryInfoKeyW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- HeapAlloc
- FindResourceW
- UnhandledExceptionFilter
- VirtualQuery
- VirtualQueryEx
- GetTickCount
- GetProcAddress
- HeapCreate
Matching Rules
| Rule Name | Rule Type |
|---|---|
| YARA_QEMU_REGISTRY | YARA |
| YARA_Detect_Possible_GetForegroundWindow_Evasion | YARA |
| YARA_Findcrypt | YARA |
| YARA_VBOX_REGISTRY | YARA |
| YARA_XOR_Hunt | YARA |
Matching Techniques
| Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
|---|---|---|---|---|
| Detecting Virtual Environment Artefacts | U1332 | |||
| Cryptography | U0703 E1027.m04 | |||
| Wiping or Encrypting | U0301 | |||
| XOR Operation | U0701 E1027.m02 |