Behavioral task
behavioral1
Sample
d1f1fe8dbf111b06676ec8ac2a4fbb91ce23109c4953834801e0c3a33f8aa160.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1f1fe8dbf111b06676ec8ac2a4fbb91ce23109c4953834801e0c3a33f8aa160.exe
Resource
win10v2004-20221111-en
General
-
Target
d1f1fe8dbf111b06676ec8ac2a4fbb91ce23109c4953834801e0c3a33f8aa160
-
Size
519KB
-
MD5
49fa58b4cc57dc7c5c136830b8b20cf8
-
SHA1
02939984ece96963b6eab85b9a9991a59910b07e
-
SHA256
d1f1fe8dbf111b06676ec8ac2a4fbb91ce23109c4953834801e0c3a33f8aa160
-
SHA512
808981ee1ce5b6e3a968580ca671d526676a344ca5c64bf0983c60b175fca5231ab52cbe3581efa26ec0ccc0742125391ad41423502943e267ee2a9ee8654443
-
SSDEEP
12288:Z14rXjh3TOWfsasqCI5d3GFlnA+s7vkn3NL2CR7RE8RqY:Z1OhjOWfsaLD5d38NA+KkZ97RnRqY
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
d1f1fe8dbf111b06676ec8ac2a4fbb91ce23109c4953834801e0c3a33f8aa160.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 441KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 23KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE