DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Gbieh
SpecialFunction
Behavioral task
behavioral1
Sample
b4d80fa1ec2bb134571afae794931589.dll
Resource
win7-20240221-en
Target
b4d80fa1ec2bb134571afae794931589
Size
747KB
MD5
b4d80fa1ec2bb134571afae794931589
SHA1
af85cad0d2470d2b59a07e094d91f4102504981e
SHA256
a8470d046a3d721c477a774a20c80b1c0470133938292a0b80c9394510be36fe
SHA512
39cec2c812d7523c52c6f3b49c3575e1f75a82c8dfa4ac38038d3c7c8ec6ac1753069794ddfef0f4945c796c5003efe33f4a6b98035fa94e8a8693a8c91cd022
SSDEEP
12288:B9ME/toFM259YaUOn92S0H5pKr3SgyXIKcOzN+IldpxvhvviFbJgdm8TIxAqO7WP:P7yYXO9L0ZAZKcyrpxvh1UdOAlB
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
b4d80fa1ec2bb134571afae794931589 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Gbieh
SpecialFunction
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE