Static task
static1
Behavioral task
behavioral1
Sample
NIGGER.exe
Resource
win10v2004-20230221-en
General
-
Target
NIGGER.exe
-
Size
376KB
-
MD5
20cda481875f48095702e9cd80cad824
-
SHA1
0ecdaa1f4d58eafffdd63377f03c670b8ba92ab1
-
SHA256
a91eaa4f3175e01b14b4ca778270fe0db6693672965bc710ecbfd614cf4733b7
-
SHA512
a16253235dc046aaa633bd706b68cfa97ab7ae8f42586fc98b227f1749093d0dda6cee8757cdb7068af2a88d8e77d7ddbee590151b44d1c4efb43854f78d46f9
-
SSDEEP
6144:BwrHBBmbhudentWttuG/xvJMlk9WvLHj4Tmj2IggR8uqQiwQ63DtK9qsi55Dm8:SmjQL/xvJ7IvLDXfggXqHwdK9qsi5tL
Malware Config
Signatures
Files
-
NIGGER.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.#yd Size: - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.K4= Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.\eb Size: 369KB - Virtual size: 368KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ