Behavioral task
behavioral1
Sample
c0d46bbe00e06bfd31bc3aac6ea2bebd8b68037e1d972b2e47df3258b94de240.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0d46bbe00e06bfd31bc3aac6ea2bebd8b68037e1d972b2e47df3258b94de240.exe
Resource
win10v2004-20220901-en
General
-
Target
c0d46bbe00e06bfd31bc3aac6ea2bebd8b68037e1d972b2e47df3258b94de240
-
Size
892KB
-
MD5
06e4ac1cf432cdb3503a962394ec46d0
-
SHA1
1f5c69b10fbd31d913dc51fad757f394e41ec9f5
-
SHA256
c0d46bbe00e06bfd31bc3aac6ea2bebd8b68037e1d972b2e47df3258b94de240
-
SHA512
b8657ddc73ed660b649d6f09b06996adaba31eba439cf9f7d9c0ab9ffa72effc5a1bfc55fa8baec8ff6eae4bd7ef09ac43f3784b4e32b495c5e5c353f2000fd8
-
SSDEEP
3072:4AjfKFeIeaJk+ox/Now0LdEWeDQSKPhprmHR/V0Hlm2QA3V5rdX279gDVJ6Hf6uS:7nNovLTeDQSgYRdCuAFeJoVMq2
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
c0d46bbe00e06bfd31bc3aac6ea2bebd8b68037e1d972b2e47df3258b94de240.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
0 Size: 708KB - Virtual size: 708KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE