DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
4bb6c0ee588752d041c102da3f226011.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bb6c0ee588752d041c102da3f226011.dll
Resource
win10v2004-20231215-en
Target
4bb6c0ee588752d041c102da3f226011
Size
182KB
MD5
4bb6c0ee588752d041c102da3f226011
SHA1
1a36fbe61e382208ac69f4caa69d4c2f2345774b
SHA256
c071758b1b39c913cdeb6ffd090e21b21744d01298290ea4c0e2538f94188cc0
SHA512
e66655961bf9c5e61d97d1b3f08d26f6e3b168df93e7cd8e84f48c970adafae38c10c9134228b74e3b2b70f72df6c618dd227fa73a5728c3ade7271ec7670c2f
SSDEEP
3072:AdCqGZWIwA1fKqOiRbXrWn3bbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7DA:aIZW613ynLwvP6bQ7yMP+DE827DgV
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
4bb6c0ee588752d041c102da3f226011 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE