Behavioral task
behavioral1
Sample
801aee7171b6acbcf7fc06fe82cfc078.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
801aee7171b6acbcf7fc06fe82cfc078.exe
Resource
win10v2004-20231222-en
General
-
Target
801aee7171b6acbcf7fc06fe82cfc078
-
Size
55KB
-
MD5
801aee7171b6acbcf7fc06fe82cfc078
-
SHA1
a49663d90158e5534bd75a15d12efd3fb30b368b
-
SHA256
18b8c0a5b48c7616a95f110c0bf09f3a1978914e2e8b0d3e85ff22eb3f9cbf71
-
SHA512
0228cc5ef318426ff016f7e3e493329bdff1b9477141cca1c827113e2786087794b5cc2333c476aff2a1a4a0b86c0d35668f0314747829d137f8f69ecad26e4e
-
SSDEEP
1536:hOSK1wb46EtXyaB+/0l4AMkvZBs8FNCr5giVm0lJl:h3K1kW9+C/vA8FUJL
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 801aee7171b6acbcf7fc06fe82cfc078
Files
-
801aee7171b6acbcf7fc06fe82cfc078.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc_ Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE