Behavioral task
behavioral1
Sample
58f2ec20acc78eb2a23d33a36335d7f5f35f8f8ccb39d3dcf0dcb0ce9dc91f60.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58f2ec20acc78eb2a23d33a36335d7f5f35f8f8ccb39d3dcf0dcb0ce9dc91f60.exe
Resource
win10v2004-20220812-en
General
-
Target
58f2ec20acc78eb2a23d33a36335d7f5f35f8f8ccb39d3dcf0dcb0ce9dc91f60
-
Size
412KB
-
MD5
d75a32161b3f697bad86b21f5ec53a5d
-
SHA1
146b433ecf40f296ae77b2bd112897cf0f10fc06
-
SHA256
58f2ec20acc78eb2a23d33a36335d7f5f35f8f8ccb39d3dcf0dcb0ce9dc91f60
-
SHA512
7eeadcbfd4143bad794a44d6cc41e6a94991e7f7f6fce44880fa7f4c1993392eacd920bdd248838e935af46f3016e9f3b88a22b2f829175dd2da62c8d4cbde2f
-
SSDEEP
6144:kVZo0YbDTJVZ4lK/We/k2sqs0We/D1yEcjXnBWr/7K8q8vjUid5XLQnnHN6zKInC:kVZazJ74I/Wes2sIWeJ7jqjnnHNj6oz
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
58f2ec20acc78eb2a23d33a36335d7f5f35f8f8ccb39d3dcf0dcb0ce9dc91f60.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 229KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 163KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE