Static task
static1
General
-
Target
loader.exe
-
Size
4KB
-
MD5
e7ff6f8aac33cd4bdc2398b2078b32ab
-
SHA1
ecb757ad2ea08b29c2857e6e81340a4c40a3d1af
-
SHA256
dc7753407b6b0e0fb10e9e80b8063f9e9fbbe498c7421f63afb66f98ed4a5fbd
-
SHA512
c1efc414a4ef9a8a9c196cb09ccc269cec13bae03fa249804689b1c5b140a10f9900af7032a0b7eef5212b0da97125271e7e5f0ef61602e7a737c311e5c2b7f4
-
SSDEEP
96:xhd8QOHupTqcO1SeUaw7X1sql0d3ojarl:TuQOHOTq1X1AlsqOdh
Malware Config
Signatures
Files
-
loader.exe.exe windows x86
Password: test6346
699cc9570c233cf12692f95447a4cdc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
shell32
ShellExecuteA
msvcrt
__argc
__argv
_environ
_XcptFilter
memset
__set_app_type
_controlfp
__getmainargs
exit
kernel32
SetUnhandledExceptionFilter
Sections
.text Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ