Behavioral task
behavioral1
Sample
Astral/AstralUI.exe
Resource
win11-20240508-en
General
-
Target
Astral.rar
-
Size
30.7MB
-
MD5
6e8414fbd94fe60a5347c94a5efb9c8c
-
SHA1
698d9e1c38811726cc820e2264358e08cb178b6b
-
SHA256
f46c2ff9ae635b9971f1e73c085682b3ce805a547f37874f6e89761221cdca22
-
SHA512
4da434a9aeee61a80f6e74896e0fdfea0d801d6079ffa289f3b552865c0d3ec4281a8251cc2289bcf3bfb8ed7172436da1970c5fd7e6af227c3518ce28c843b7
-
SSDEEP
786432:NpFx+oyPb1HxGv3mKh3U3kjHqDzNtE9fjgtYhtRnjsFXzmDCylQ:ODBRWmKt8ZDJtE9Lgqln2mDTQ
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Astral/AstralUI.exe themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Astral/AstralUI.exe
Files
-
Astral.rar.rar
-
Astral/AstralUI.exe.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 69KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 23KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 27.4MB - Virtual size: 27.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 5.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ