Static task
static1
Behavioral task
behavioral1
Sample
PSX SCAM HACK.exe
Resource
win7-20230712-en
General
-
Target
PSX SCAM HACK.exe
-
Size
442KB
-
MD5
bbd758610e88b5cf9c91952ac03bb1d1
-
SHA1
610a7816aef1812d335d918d50008409240ad5a3
-
SHA256
aca6fcd219cc022acafbac4123240fb1790f3337d028fc30575a90ce985fae64
-
SHA512
4d15c2e15f9bf044ef5c00287454c04ac2d92cd9cc8b0f5135dfd108d0244645bb40a8a82206f8fd523e43ede942d4ff3e264d28ac33b850bbca51a2f1cfb412
-
SSDEEP
6144:GsoFqr2GXTlGJU0/Vx4BSeprj/ImcY1lY1Y1l17gCM1111Y11aY1+1h/wtCw/vYY:gqiGXTgJ/3U/C2vYfRvpHXdy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PSX SCAM HACK.exe
Files
-
PSX SCAM HACK.exe.exe windows x86
Password: 123
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ