Behavioral task
behavioral1
Sample
bb30df9b2b5da7403d38b1f1bd78ae0aaa7e582e36402eef30acc29a847d018d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bb30df9b2b5da7403d38b1f1bd78ae0aaa7e582e36402eef30acc29a847d018d.exe
Resource
win10v2004-20220812-en
General
-
Target
bb30df9b2b5da7403d38b1f1bd78ae0aaa7e582e36402eef30acc29a847d018d
-
Size
387KB
-
MD5
79207e700c40d7c6761ae9d42a13110b
-
SHA1
18c50928d379c368d2a75cd6da050f61ae4f391d
-
SHA256
bb30df9b2b5da7403d38b1f1bd78ae0aaa7e582e36402eef30acc29a847d018d
-
SHA512
fc811f8ead8c2b1e6f3d69c4a424c79332dd234a9b5d0812d0cd6f92bf72cf4c1bb430f9f694be57cd1979b4b4b6c142e776f35234634dd66c70760f3abcf1d7
-
SSDEEP
12288:e+xouGZfOmHZ5qhvMORCLdyFKKi3PAIcaGBg:roff5olMORCL8AR3Hc9Bg
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
bb30df9b2b5da7403d38b1f1bd78ae0aaa7e582e36402eef30acc29a847d018d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
pec1 Size: 310KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pec2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pec3 Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pec4 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pec5 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pec6 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pec7 Size: 70KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE