Behavioral task
behavioral1
Sample
dbf3b53d726f435ae3859a79251259b7ac609cd9d7248f5edec5bb92840f1c6c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dbf3b53d726f435ae3859a79251259b7ac609cd9d7248f5edec5bb92840f1c6c.exe
Resource
win10v2004-20230221-en
General
-
Target
dbf3b53d726f435ae3859a79251259b7ac609cd9d7248f5edec5bb92840f1c6c
-
Size
395KB
-
MD5
33010b99a58555cec3e832cf2f37876b
-
SHA1
cbeece8bf34d23c65b91ab71e0f8a24dc9bf17a4
-
SHA256
dbf3b53d726f435ae3859a79251259b7ac609cd9d7248f5edec5bb92840f1c6c
-
SHA512
e140f4ce8f2155dcf92046ac37b9c74b984da8c8294af9098d3b0bcce7b962a44ccbc9534ab5aecb80fd8cd6a9577ed263422de5b5b8939cf7ebccb80c6bd878
-
SSDEEP
6144:8K91Mw2b3YZKMPfWy71GrGE4Qq1ywpSSKdDTu5jGwMyYejmcSIGQUYOi:hMwSMPVYq1yES3DajjMyYexJh
Malware Config
Signatures
-
Processes:
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource dbf3b53d726f435ae3859a79251259b7ac609cd9d7248f5edec5bb92840f1c6c
Files
-
dbf3b53d726f435ae3859a79251259b7ac609cd9d7248f5edec5bb92840f1c6c.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 252KB - Virtual size: 628KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
flag_dat Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE