/Users/aishacct/Projects/Keylogger/Keylogger/obj/x86/Release/Keylogger.pdb
Static task
static1
General
-
Target
sample01.exe
-
Size
6KB
-
MD5
e210880ff042f6a94f333f9b99d4b23e
-
SHA1
58ec9d821a152e062fbc4839352106061346a665
-
SHA256
d9df2e7b3f7714448b36cc5aca8db9a27bb52b00b2310abc300d0ffb6002afce
-
SHA512
1486503180812a35b91263905d8ed6ed6b1c432bb1d3a1650d3181d5e285c41551fd51ef81ec1f30d7c481c61b3878660d98119220204694fe24c0cd26117f34
-
SSDEEP
96:9zYpOHBpo8PU39CtoSdeK+SfcWcYFz9B5KTA7zNt:9zzBpoWU39CleK+ucWcYFRrKTE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource sample01.exe
Files
-
sample01.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ