Static task
static1
Behavioral task
behavioral1
Sample
Unlocked_Spoofer_Free.zip
Resource
win10v2004-20230220-en
General
-
Target
Unlocked_Spoofer_Free.zip
-
Size
16KB
-
MD5
762b1ba007f2de91a47539ead74be948
-
SHA1
8c9cd65cbc5fab62a4cde21fc63ea7b3acdda143
-
SHA256
9b2d94c06c22a171a8c5f600190e1d75c0051ccb660955fb0303375ed5944ade
-
SHA512
768d583e1945850bd154bacd621d3535361a0c09438bf0d92acdbfd983c595dfbff5efc04c64a892cb1078ee34b4c65b86dfeaa71a35e29fa16187784b6694b5
-
SSDEEP
384:Wvoyn5ZXlnUgou6/xCSYAkiUNd/KzIry9KNB:Wt1nHou6/xCRNd/KgNB
Malware Config
Signatures
Files
-
Unlocked_Spoofer_Free.zip.zip
-
Unlocked Spoofer Free/Whiz Spoofer.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ