StartHook_Vip
Behavioral task
behavioral1
Sample
bf148e3f820901a62e145cff8e397083.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf148e3f820901a62e145cff8e397083.dll
Resource
win10v2004-20240226-en
General
-
Target
bf148e3f820901a62e145cff8e397083
-
Size
854KB
-
MD5
bf148e3f820901a62e145cff8e397083
-
SHA1
7b2b91d08aa6e562447ed57c8bfbcde3e05dabc9
-
SHA256
b8955bea06dfc277e1c2782865c26333286570899a432c796eaab0050b3be66b
-
SHA512
7590165b479f510fb5ccff1a59beba025e41fdd85f6a4cfa50e002c53c98e198bfd97a7e3e56fff4539ab2a7ec3956c5a999611fe4f1a768cb8e3ed9383d2ab7
-
SSDEEP
24576:0iqWROmGWJMMxwA8o2MKdqimM0bFdTitqfo:0iFRORMpuFdwM0R5WAo
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf148e3f820901a62e145cff8e397083
Files
-
bf148e3f820901a62e145cff8e397083.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
Size: 125KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 17.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 319KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 17KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 350KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE