HookOff
HookOn
Behavioral task
behavioral1
Sample
5a47536b56b707bd95e7e087f832c500.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a47536b56b707bd95e7e087f832c500.dll
Resource
win10v2004-20231215-en
Target
5a47536b56b707bd95e7e087f832c500
Size
43KB
MD5
5a47536b56b707bd95e7e087f832c500
SHA1
fb005eca8731898913c1336792bcdb946a04c0fc
SHA256
6f15f6028176d9bd342b1991d996044ea3fbf77ffc6bbc81a717efb1ca3004f2
SHA512
fa2f59316d6cc61c253db4ea2e6bc73891c46afdbcf538e3fca5a388a1d4d4dbdcdf861a612ab1c24b782764c8786be7241368fe3163b212cf36aed0615610df
SSDEEP
768:wksQEn2OrKjPZttzSJJUaLZtKeaIfz7GHeLtUScm45NpE/9ZpecCx/ha5:KQkJO6ZtKeae3qeWfm4zpcucU
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
5a47536b56b707bd95e7e087f832c500 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE