Extended Key Usages
ExtKeyUsageCodeSigning
Target
盗U套路技术分析,揭秘背后玩法逻辑!.exe
Size
1.9MB
MD5
cde3632191db2fcb81e5c3b7e746449d
SHA1
404973ef5b08ddf073ee3436496612bfacdd2672
SHA256
8c21cf49564f98f2e8a08d71c559ead5b9675250453b301d568e10d3cb3b7cfe
SHA512
77a8ee2783255bffcedaf1f1a079351b38f88a4f987d82bef2f04dfe5ac16493481bbf87475791a54083c2b9f71b038205a251802898ee52d74d31f66d3c04fe
SSDEEP
49152:8ADrmN8ndmfV+eYbh8alBgFVGiytIv4jZJIIdeoAKxV9hf:L3mYQfV+d18alBayWCZJbAGZ
resource | yara_rule |
---|---|
sample | upx |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE