Behavioral task
behavioral1
Sample
87a24c6e43697b65e3cd3fae197b2323669113c390bfc70f47e52334352048d2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
87a24c6e43697b65e3cd3fae197b2323669113c390bfc70f47e52334352048d2.exe
Resource
win10v2004-20220901-en
General
-
Target
87a24c6e43697b65e3cd3fae197b2323669113c390bfc70f47e52334352048d2
-
Size
506KB
-
MD5
16958e9d46cd784facf9aadaf7207eeb
-
SHA1
41aa476bef03c04fc1e1162ea486449d0c891e89
-
SHA256
87a24c6e43697b65e3cd3fae197b2323669113c390bfc70f47e52334352048d2
-
SHA512
8868e25186620f0c76c9c77f730accb31bf05c949ab6af1376b22c8ee0b91e2a143cee9065ad33caf0985d9b917a279ec00fa9c8d948103da3b134c93289e560
-
SSDEEP
12288:hrnkzL6RcJq3U+LKyB/AGBZrTBSn7q8G8luor8S+mGv:hoQcJj8KwBSn+Iw3SpU
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
87a24c6e43697b65e3cd3fae197b2323669113c390bfc70f47e52334352048d2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 322KB - Virtual size: 828KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 157KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE