Static task
static1
General
-
Target
JumpKing.exe
-
Size
442KB
-
MD5
e6ed88f23e31776dfa75a747b618b710
-
SHA1
95b96701574e3fbbed610a4806fcfe7e657679e6
-
SHA256
35a0e322a16401015246b5a4d12f667fe03282fab3a301eb778f13b7de3a0227
-
SHA512
97f2e12326d9cf31cc10ed9230843d6d8151cea0fbb91e21267ef288b56d1f1211a1c3e63d1a380c1c7a3a8a5dad7455d58a182ff11ac3c1ac8e6f7fd850f017
-
SSDEEP
6144:3f87VqSlDRxfNM/QazF6qYw6lH6FngksixPSSUHMFRIXHWTOYd4:P87VqKVxfm/9n6QlsixPAsFRIdK4
Malware Config
Signatures
Files
-
JumpKing.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 259KB - Virtual size: 258KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ