Behavioral task
behavioral1
Sample
231387a3f4774cf7cf318fb8e5644d817bf6d35e093377a19c9ef95f6d9a2774.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
231387a3f4774cf7cf318fb8e5644d817bf6d35e093377a19c9ef95f6d9a2774.exe
Resource
win10v2004-20230703-en
General
-
Target
231387a3f4774cf7cf318fb8e5644d817bf6d35e093377a19c9ef95f6d9a2774
-
Size
15.7MB
-
MD5
99a820fb3af65ff3991d8dfb3ce42765
-
SHA1
19cdcf96d7f2a52e0f8e255c7ea3d83e79d2a26b
-
SHA256
231387a3f4774cf7cf318fb8e5644d817bf6d35e093377a19c9ef95f6d9a2774
-
SHA512
70a0fbe3dea7d51e3ce5ac5a73acebc9d0356e5d1707c565b5e5943f4f37aecdeba9ff01775baea6a6a0f76510e50cc8fca1d351d6e286cd608679cc771ae682
-
SSDEEP
393216:DGTBC7j4vCjDQ8gyytGGM13BUVR1p9aDOVm0AMXLOPsqvelar138uB:Dme698AgtBozImAMbIsO/1t
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 231387a3f4774cf7cf318fb8e5644d817bf6d35e093377a19c9ef95f6d9a2774
Files
-
231387a3f4774cf7cf318fb8e5644d817bf6d35e093377a19c9ef95f6d9a2774.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 377KB - Virtual size: 968KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 117KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 25KB - Virtual size: 388KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 84KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE