Behavioral task
behavioral1
Sample
d1849e6c32f57f65bc48780fcd23a2ec8be25b911caea0ccd4cb5ca7d211aaf9.exe
Resource
win7-20221111-en
General
-
Target
d1849e6c32f57f65bc48780fcd23a2ec8be25b911caea0ccd4cb5ca7d211aaf9
-
Size
261KB
-
MD5
302a3edbdd45ef83c80980eba8aec822
-
SHA1
a05f944c3ce26222006c1fa21ab298c89c03bbc8
-
SHA256
d1849e6c32f57f65bc48780fcd23a2ec8be25b911caea0ccd4cb5ca7d211aaf9
-
SHA512
719439749aff9b8c44af9bea6f24a62552f2ff046b44a4abc2e178b5b0aeb9576a4e3daba422ee24cd22811008f9f16a4dc5a3699dfcbaf5504d4a76fc1b1fec
-
SSDEEP
6144:6/UZ947bqBTMzyRhO1sxGJPHyTXNNSziKa9eX:6sWbqB/RhLG1QXNNS
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
d1849e6c32f57f65bc48780fcd23a2ec8be25b911caea0ccd4cb5ca7d211aaf9.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 20KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 226KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Em!NE Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE