Behavioral task
behavioral1
Sample
47c87afcfa3cf8798c08c9f97bafd410b659c2312e5b79f2b9296bd9a05c58e0.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
47c87afcfa3cf8798c08c9f97bafd410b659c2312e5b79f2b9296bd9a05c58e0.exe
Resource
win10v2004-20230703-en
General
-
Target
47c87afcfa3cf8798c08c9f97bafd410b659c2312e5b79f2b9296bd9a05c58e0
-
Size
702KB
-
MD5
077ea891914898114209fd6bb63ed780
-
SHA1
3720878fc26e17eff3769f938d814680d49abad1
-
SHA256
47c87afcfa3cf8798c08c9f97bafd410b659c2312e5b79f2b9296bd9a05c58e0
-
SHA512
144ff6b2a07491eee7bf269037878c8deb9e4a08fbf81cd4d0fc06d348e9f0fccf16531209e231067ac6faa4de6aa89619c47647a0f1fc1e6f285d9bc3ee5331
-
SSDEEP
6144:SFQbXa56iQQBV9+DMTL9ryVEwk2HtFMtzU:Sybq5ce+DMT5ry+mTwU
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47c87afcfa3cf8798c08c9f97bafd410b659c2312e5b79f2b9296bd9a05c58e0
Files
-
47c87afcfa3cf8798c08c9f97bafd410b659c2312e5b79f2b9296bd9a05c58e0.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 220KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 312KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE