@@Unidadrpn@Finalize
@@Unidadrpn@Finalize
@@Unidadrpn@Initialize
@@Unidadrpn@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_frm
Behavioral task
behavioral1
Sample
桌球/VirtualPoolMobile_PPC_v16x_17x_KeyGeN.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
桌球/VirtualPoolMobile_PPC_v16x_17x_KeyGeN.exe
Resource
win10v2004-20240802-en
Target
b0c6f1a681437594c55aff640a8fd0d4_JaffaCakes118
Size
5.6MB
MD5
b0c6f1a681437594c55aff640a8fd0d4
SHA1
b312a963ddb5c9faf599847f6a3f2e8d8551adf3
SHA256
557df6b510dbc1274953e1b9448afbc88c9fdd49f36e1d1ace5af2657856a6f7
SHA512
6aa9d290ce25fd22e4fee90bbd445c3498f3d1494a366057826cf4be3c8c85acb65069043429ba56d60bed3042562c9ba822d1ca76fceaa5348468142e07c773
SSDEEP
98304:Uvn1nDAAkvxL08CRgUj2bU+r7EndVB5KY9EG1uaQzrUPLxTRE98MQxaum1pB4:Uv1nsJV08Aj2bUTndVBQGUaQz4PLx1Eg
resource | yara_rule |
---|---|
static1/unpack001/桌球/VirtualPoolMobile_PPC_v16x_17x_KeyGeN.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
unpack001/桌球/VirtualPoolMobile_PPC_v16x_17x_KeyGeN.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
@@Unidadrpn@Finalize
@@Unidadrpn@Finalize
@@Unidadrpn@Initialize
@@Unidadrpn@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_frm
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE