Static task
static1
General
-
Target
JumpKing.exe
-
Size
643KB
-
MD5
6b057454b1785417cf2ecb72012a4fec
-
SHA1
ddf411afa5cb702c3f7ff0956ab5c0fa40e486d0
-
SHA256
7f1c67a17903d5275337940b247ae7d7c6bf9eeedb70c975e496a2da200db40d
-
SHA512
6f030afa318c8e2ea1bf23218232b7c1bbf44e0549f28266192fe892a89682d3d061aa0bebbd51cf6654874b70cc1a22aa55c24fa5efea98bbd7bb8d9c0e281a
-
SSDEEP
12288:zmdRH7nWTHngN+G3JQ6PasuzgxRMRsiOP5sFRIdKi:zmdRH7WTH+3LPaXxRsiOxuLi
Malware Config
Signatures
Files
-
JumpKing.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 460KB - Virtual size: 459KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ