Static task
static1
Behavioral task
behavioral1
Sample
TikTok Exploit.exe
Resource
win10v2004-20230221-en
General
-
Target
TikTok Exploit.exe
-
Size
46KB
-
MD5
41cf744a36f92dbf014bd2e9e12019b6
-
SHA1
5c673784fa8472d60a6eb8650463d859adf17fd4
-
SHA256
b15cbe63741aaedfa91d03f2bed1192c5bbe755773886af3f2f5d6287d073ecc
-
SHA512
a03accd446d06842d6d1c32dfbaef538112a852825a5dd636d508a4fcd957ab53d5cb8c87e732b92d7774559e4f4922119ae0d749b22f02f940f0fad3a1a442c
-
SSDEEP
768:sGDphisbNYEoJTm+eHzFz3H4b+Xm/HbO7goipk1S9KpGTAhqtUni:sGDdujm+YR4bZ/C7tipoS9/aqtEi
Malware Config
Signatures
Files
-
TikTok Exploit.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ