Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
10Static
static
10Astral Spoofer.zip
windows7-x64
1Astral Spoofer.zip
windows10-2004-x64
1Astral Spo...er.exe
windows7-x64
10Astral Spo...er.exe
windows10-2004-x64
10Astral Spo...er.exe
windows7-x64
8Astral Spo...er.exe
windows10-2004-x64
8Astral Spo...ME.txt
windows7-x64
1Astral Spo...ME.txt
windows10-2004-x64
1Astral Spo...gs.vbs
windows7-x64
1Astral Spo...gs.vbs
windows10-2004-x64
1Astral Spo...ol.exe
windows7-x64
7Astral Spo...ol.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
Astral Spo...ol.ini
windows7-x64
1Astral Spo...ol.ini
windows10-2004-x64
1Astral Spo...I2.dll
windows7-x64
1Astral Spo...I2.dll
windows10-2004-x64
1Astral Spo...on.dll
windows7-x64
1Astral Spo...on.dll
windows10-2004-x64
1Astral Spo...on.xml
windows7-x64
3Astral Spo...on.xml
windows10-2004-x64
1Astral Spo...NS.txt
windows7-x64
1Astral Spo...NS.txt
windows10-2004-x64
1Astral Spo...er.bat
windows7-x64
1Astral Spo...er.bat
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Astral Spoofer.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Astral Spoofer.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Astral Spoofer/Astral Spoofer.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Astral Spoofer/Astral Spoofer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Astral Spoofer/Bootstrapper/Bootstrapper.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Astral Spoofer/Bootstrapper/Bootstrapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Astral Spoofer/Bootstrapper/READ ME.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Astral Spoofer/Bootstrapper/READ ME.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Astral Spoofer/Disable windows defender/Defender_Settings.vbs
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Astral Spoofer/Disable windows defender/Defender_Settings.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Astral Spoofer/Disable windows defender/dControl.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Astral Spoofer/Disable windows defender/dControl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
out.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Astral Spoofer/Disable windows defender/dControl.ini
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Astral Spoofer/Disable windows defender/dControl.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Astral Spoofer/Guna.UI2.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Astral Spoofer/Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Astral Spoofer/Newtonsoft.Json.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Astral Spoofer/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Astral Spoofer/Newtonsoft.Json.xml
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Astral Spoofer/Newtonsoft.Json.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Astral Spoofer/READ ME INSTRUCIONS.txt
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Astral Spoofer/READ ME INSTRUCIONS.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Astral Spoofer/Serialchecker.bat
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Astral Spoofer/Serialchecker.bat
Resource
win10v2004-20240802-en
Target
Astral Spoofer.zip
Size
2.7MB
MD5
83e348240aa57c1608784559029dfcc6
SHA1
4341ab55200d4f169865f5d8fa961daf6533630a
SHA256
fc177447cdf3ff84cf9c88ab9692242e525b00ea5067e4bc3773823ac9305253
SHA512
98d9872f8db9304e424066e73089865e32ad685ebc4522bd4313194744c7c0e6664d928ecc53f19dc9394796ce2651ea925474affba1a9b8666a7c0d2ecb7c8a
SSDEEP
49152:dAF/EZS7drppV00el5KYs6z5WCPgb1mCXqUw+mQc4x6C2P67aRoO0TgSN7DPcRZM:dvoxppu0R2tonU+PX6JVoDgSNnaQkdVC
resource | yara_rule |
---|---|
static1/unpack001/Astral Spoofer/Guna.UI2.dll | family_agenttesla |
resource | yara_rule |
---|---|
static1/unpack001/Astral Spoofer/Disable windows defender/dControl.exe | upx |
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | autoit_exe |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Astral Spoofer/Astral Spoofer.exe |
unpack001/Astral Spoofer/Bootstrapper/Bootstrapper.exe |
unpack002/out.upx |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
memset
wcsncmp
memmove
wcsncpy
wcsstr
_wcsnicmp
_wcsdup
free
_wcsicmp
wcslen
wcscpy
wcscmp
wcscat
memcpy
tolower
malloc
GetModuleHandleW
HeapCreate
GetStdHandle
SetConsoleCtrlHandler
HeapDestroy
ExitProcess
WriteFile
GetTempFileNameW
LoadLibraryExW
EnumResourceTypesW
FreeLibrary
RemoveDirectoryW
EnumResourceNamesW
GetCommandLineW
LoadResource
SizeofResource
FreeResource
FindResourceW
GetShortPathNameW
GetSystemDirectoryW
EnterCriticalSection
CloseHandle
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
TerminateThread
CreateThread
Sleep
WideCharToMultiByte
HeapAlloc
HeapFree
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
PeekNamedPipe
TerminateProcess
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcess
DuplicateHandle
CreatePipe
CreateProcessW
GetExitCodeProcess
RtlLookupFunctionEntry
RtlVirtualUnwind
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
HeapSize
MultiByteToWideChar
CreateDirectoryW
SetFileAttributesW
GetTempPathW
DeleteFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
SetFilePointer
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
DeleteCriticalSection
GetLastError
SetLastError
UnregisterWait
GetCurrentThread
RegisterWaitForSingleObject
ShellExecuteExW
SHGetFolderLocation
SHGetPathFromIDListW
timeBeginPeriod
CoInitialize
CoTaskMemFree
PathAddBackslashW
PathRenameExtensionW
PathQuoteSpacesW
PathRemoveArgsW
PathRemoveBackslashW
CharUpperW
CharLowerW
MessageBoxW
DefWindowProcW
GetWindowLongPtrW
GetWindowTextLengthW
GetWindowTextW
EnableWindow
DestroyWindow
UnregisterClassW
LoadIconW
LoadCursorW
RegisterClassExW
IsWindowEnabled
GetSystemMetrics
CreateWindowExW
SetWindowLongPtrW
SendMessageW
SetFocus
CreateAcceleratorTableW
SetForegroundWindow
BringWindowToTop
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyAcceleratorTable
PostMessageW
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetWindowPos
GetStockObject
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
/_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ