D:\HideRootKit\objfre\i386\MayaSYS.pdb
Static task
static1
General
-
Target
9b9b8b8e99c4da496ce00727912280bf
-
Size
4KB
-
MD5
9b9b8b8e99c4da496ce00727912280bf
-
SHA1
4b46254ff9904a9b46c651b98bd933fbb13464d4
-
SHA256
f5d4cec87b92512050b24914f3333c10740dd2fec3d7844d651d60749c01a0f4
-
SHA512
2d7b64015e094f271c72d66feb7a9f42fc22e8e2a50e8e81c7df2bb68f7c9d67c242e136ac6986bf191705ab3cbdcd857ff474c70d2094d98ffab40754ba70e2
-
SSDEEP
96:hABBxT/5NV+8wff2xa6cn3xa6cn0JVV1g:hA9V7wWxaLxawU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9b9b8b8e99c4da496ce00727912280bf
Files
-
9b9b8b8e99c4da496ce00727912280bf.sys windows:5 windows x86 arch:x86
fe778f654895e3b8ef796e61eefcf7f2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
KeServiceDescriptorTable
ZwQueryDirectoryFile
IoDeleteDevice
IoDeleteSymbolicLink
IofCompleteRequest
RtlFreeAnsiString
DbgPrint
RtlCompareMemory
RtlUpperString
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
RtlInitAnsiString
_strnicmp
strncpy
IoGetCurrentProcess
ProbeForWrite
ProbeForRead
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 215B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 768B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 538B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ