StartHook
Behavioral task
behavioral1
Sample
56fb33e1dc558ef0c2ef4a58ed138dd94df4cd4077cf3af69c6cdd70e52e7016.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56fb33e1dc558ef0c2ef4a58ed138dd94df4cd4077cf3af69c6cdd70e52e7016.dll
Resource
win10v2004-20220901-en
General
-
Target
56fb33e1dc558ef0c2ef4a58ed138dd94df4cd4077cf3af69c6cdd70e52e7016
-
Size
472KB
-
MD5
1697ee0080ef344e92219ad65c5b870d
-
SHA1
ab3114de2f894b049cbe03b81fa939926cd3e8cc
-
SHA256
56fb33e1dc558ef0c2ef4a58ed138dd94df4cd4077cf3af69c6cdd70e52e7016
-
SHA512
1863abbe69717a4514751c879fd44c03c8fc50d0416548a1b72f8785d9a8bc4ff425e59f199af6e7daaf8ca540449cf8310adf7b1991a81b5545277a2319e855
-
SSDEEP
12288:0gHonBdzL8IwmMvMFpKIJjgqxK7DlSzj0qoqk2z:1HedvimM0b7sq0qozu
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
56fb33e1dc558ef0c2ef4a58ed138dd94df4cd4077cf3af69c6cdd70e52e7016.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
Size: 80KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 21KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 10KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 335KB - Virtual size: 336KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE