Behavioral task
behavioral1
Sample
2c1cafe0f7e064c0a8cf049d5414f2f379b6648760b157c2534dfefc03234704.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2c1cafe0f7e064c0a8cf049d5414f2f379b6648760b157c2534dfefc03234704.exe
Resource
win10v2004-20231023-en
General
-
Target
2c1cafe0f7e064c0a8cf049d5414f2f379b6648760b157c2534dfefc03234704.exe.zip
-
Size
2.4MB
-
MD5
b5b06beff5162ba1deefd8c099708706
-
SHA1
91c713b2ca93142da0451e52172f3e2fe316fe9c
-
SHA256
84e041d5d30859adc9e91d60059b09f3c73c102237a15aaa701770713e4345ba
-
SHA512
4d975fe06d51c234662a2d6f78e882029a590ba179ae8e07a0e8acbb2d6dd4612f4cccf534c159e625494f8e03a361466dc05f1d0a87613a4cd0d74ed9f6aa6f
-
SSDEEP
49152:RpvQxBrqxxv/BquK2gQEQs+N2Gc5EGjdDutKvOOu9sjnE:REoxxvcufs+Nafj4t6NJA
Malware Config
Signatures
-
resource yara_rule static1/unpack001/2c1cafe0f7e064c0a8cf049d5414f2f379b6648760b157c2534dfefc03234704.exe aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2c1cafe0f7e064c0a8cf049d5414f2f379b6648760b157c2534dfefc03234704.exe
Files
-
2c1cafe0f7e064c0a8cf049d5414f2f379b6648760b157c2534dfefc03234704.exe.zip.zip
Password: infected
-
2c1cafe0f7e064c0a8cf049d5414f2f379b6648760b157c2534dfefc03234704.exe.exe windows:5 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 291KB - Virtual size: 636KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 30KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE