Behavioral task
behavioral1
Sample
cca7f309acf7507683cbb9419822ba81976536a63faba22e530bd1df31a9d456.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cca7f309acf7507683cbb9419822ba81976536a63faba22e530bd1df31a9d456.exe
Resource
win10v2004-20220812-en
General
-
Target
cca7f309acf7507683cbb9419822ba81976536a63faba22e530bd1df31a9d456
-
Size
111KB
-
MD5
a05110e5f507131321215a7f58386530
-
SHA1
13a1ad6e1e6cbc92816633b7722afa2bfac526f4
-
SHA256
cca7f309acf7507683cbb9419822ba81976536a63faba22e530bd1df31a9d456
-
SHA512
0935edff5c19ed19b18a2b91aae4d8515ea2f4787049c5592258c85c5f9c425ddc4132ea91e19f09fc6d4e76d2131c12b74a40443e4d6391fbcb2637890dce0a
-
SSDEEP
3072:ZWXZ5R7Duyx9HgUlQ0hPKAcyORlAh2imJFtd9AgYzfoT:c7DuyDHgip7vodda97o
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
cca7f309acf7507683cbb9419822ba81976536a63faba22e530bd1df31a9d456.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 7KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.52pojie Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE