StartHook
Behavioral task
behavioral1
Sample
8a47a9e637f220d84d77b2afe4249fa0cbfdcf16d9082329efe1a149ee7ea34b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a47a9e637f220d84d77b2afe4249fa0cbfdcf16d9082329efe1a149ee7ea34b.dll
Resource
win10v2004-20221111-en
General
-
Target
8a47a9e637f220d84d77b2afe4249fa0cbfdcf16d9082329efe1a149ee7ea34b
-
Size
469KB
-
MD5
6ad0296e6ccdeebbc683c816432f9514
-
SHA1
6f66e322184054b60e00ffcaac8e95d580079e40
-
SHA256
8a47a9e637f220d84d77b2afe4249fa0cbfdcf16d9082329efe1a149ee7ea34b
-
SHA512
a24210fc70361d410eee44c06d2401fafd2a57ffd0585c4364d215c5706fd2a73bc6e4b562e70ea2330837a14f944b699298a0fd4b0d5303531e62388939a42f
-
SSDEEP
12288:BdUOxxvXcodjU8IwmMvMFpKIPoFMto6oJs0wZq:UOnVjUimM0b2FMtoZJLwZq
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
8a47a9e637f220d84d77b2afe4249fa0cbfdcf16d9082329efe1a149ee7ea34b.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
Size: 80KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 21KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 10KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 340KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE