DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Gbieh
SpecialFunction
Behavioral task
behavioral1
Sample
cbf08fa4d16a84fe73d3bd79ae4bd0bc.dll
Resource
win7-20240221-en
Target
cbf08fa4d16a84fe73d3bd79ae4bd0bc
Size
755KB
MD5
cbf08fa4d16a84fe73d3bd79ae4bd0bc
SHA1
e7f7c4b9ae579bb45336ddd977c40e72f19128be
SHA256
ab93d9eac6ff06f39a7f0141490f5370cc5b348a3705125b59ade47124f5e29b
SHA512
7becfbc71847908836b18d93c9398cc58fe9c5a4a97d6fc93cbc9320ee2bf84cec1163b76f70d28d620e5ac090fd338dd42fca6dc91c79d5a67d4f698e93c5a4
SSDEEP
12288:uLozFoYl5OJ4KX1rFBVoP9VLSr3SgyXIKcOzN+IldpxvhvviFbJgdm8TIxAqO7WW:uUJoYuJVfByPLSZKcyrpxvh1UdOAuedw
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
cbf08fa4d16a84fe73d3bd79ae4bd0bc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Gbieh
SpecialFunction
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE