Behavioral task
behavioral1
Sample
b57762089976c549d15209dd84a09ba7a3be2f3438c7e15ffbceee245566a9e1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b57762089976c549d15209dd84a09ba7a3be2f3438c7e15ffbceee245566a9e1.exe
Resource
win10v2004-20221111-en
General
-
Target
b57762089976c549d15209dd84a09ba7a3be2f3438c7e15ffbceee245566a9e1
-
Size
128KB
-
MD5
75685ec2ed038d97dcc05dd837b304ac
-
SHA1
f309ee149d657ef48153b361f7676d236e65b043
-
SHA256
b57762089976c549d15209dd84a09ba7a3be2f3438c7e15ffbceee245566a9e1
-
SHA512
23a445e542c7b3405e7916d546bcd78e3b17c368e5330bb98568a09490981630825f9e8b963028ddc8cddbacc0b843cffb02edad35e3068128d8860038219076
-
SSDEEP
768:YIwV+V+VG7XVG7guhUj/FXTdiLDHW6+slfraQx0bJGEpxvLoI:UV+V+VG7XVG7gmUBXTYLD26T70bJb
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
b57762089976c549d15209dd84a09ba7a3be2f3438c7e15ffbceee245566a9e1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_SYSTEM
IMAGE_FILE_UP_SYSTEM_ONLY
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.SCPACK Size: - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TEXT Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSRC Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ASPACK Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE