Behavioral task
behavioral1
Sample
cb4171c10f9ebbe8537bcc8bb4f7360a1baf162abcdcd0b6401f7ef87004e94d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cb4171c10f9ebbe8537bcc8bb4f7360a1baf162abcdcd0b6401f7ef87004e94d.exe
Resource
win10v2004-20220901-en
General
-
Target
cb4171c10f9ebbe8537bcc8bb4f7360a1baf162abcdcd0b6401f7ef87004e94d
-
Size
160KB
-
MD5
201ddceae84176e9692d5173078262fb
-
SHA1
a528df5bb28e30fe6eec0d8e78404199b05c01ba
-
SHA256
cb4171c10f9ebbe8537bcc8bb4f7360a1baf162abcdcd0b6401f7ef87004e94d
-
SHA512
8eebd565ef5e9a1ca765ce08c488f502c9387507fddee1e1b64b0dfb51edb34e94d971488a3ee7b6678aa07925758a9964d3615c24aabbd38f5ca090eb7e425d
-
SSDEEP
1536:IV+V+Vi3Vi7luyh3HOHBCSQB1epJ63r6HWkgMFrWL:IV+V+V2Vqd3HOhCSQLe7gOnPFrWL
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
cb4171c10f9ebbe8537bcc8bb4f7360a1baf162abcdcd0b6401f7ef87004e94d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_SYSTEM
IMAGE_FILE_UP_SYSTEM_ONLY
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.SCPACK Size: - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TEXT Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSRC Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.%%%%%% Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.%%%%% Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE