Behavioral task
behavioral1
Sample
65ae1a2b799ace200d65ce8c9ab25ac1cd354d756bdb6c1600364cdabddff1e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65ae1a2b799ace200d65ce8c9ab25ac1cd354d756bdb6c1600364cdabddff1e8.exe
Resource
win10v2004-20220901-en
General
-
Target
65ae1a2b799ace200d65ce8c9ab25ac1cd354d756bdb6c1600364cdabddff1e8
-
Size
384KB
-
MD5
40516fcd4f14bc43c7c0743bcce3e875
-
SHA1
ac933486e2a41c571e7a9eddbcaf585c164c7779
-
SHA256
65ae1a2b799ace200d65ce8c9ab25ac1cd354d756bdb6c1600364cdabddff1e8
-
SHA512
a2c4f06920018fab56a90f27c5ac0947ac433decec781573a72f12024585eb1a13c4d092744f668d63f8243f09c8edf3e0265df246746f4c458904931a431978
-
SSDEEP
12288:q/0bKWWv9VKg/784ef4mGIHYxlNujMs3m3O:qGKWwVKg/gCmG+quj
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
65ae1a2b799ace200d65ce8c9ab25ac1cd354d756bdb6c1600364cdabddff1e8.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 324KB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 6KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE