Behavioral task
behavioral1
Sample
4c684dc5caf6268e0c05c2d5d6f019f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c684dc5caf6268e0c05c2d5d6f019f8.exe
Resource
win10v2004-20231215-en
General
-
Target
4c684dc5caf6268e0c05c2d5d6f019f8
-
Size
211KB
-
MD5
4c684dc5caf6268e0c05c2d5d6f019f8
-
SHA1
3197852e74f1d97c917555117910d7390de67269
-
SHA256
6c9805dbaa0a2ff26904756a49d5bd9f2234b40ef117d7a84f285b21f69e3c74
-
SHA512
edaab379509e897975e1e1c4d9a6037beb3fecfbbd6f6cc84e85ff53f4777cfbc70c413757a41a0bc18f81c1b4bf15fab93fd827d3fc3680812932c4770344a6
-
SSDEEP
6144:uZ21pWK88+tI94g63V6J+ceeSMTNODtLDpCutLi:uk1pWcYI9k38J+6SMTNMBtJ+
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c684dc5caf6268e0c05c2d5d6f019f8
Files
-
4c684dc5caf6268e0c05c2d5d6f019f8.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
0 Size: 135KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 46KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 8KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE