C:\Users\Belim\Desktop\Junkctrl.LOCAL\Junkctrl\obj\Debug\Junkctrl.pdb
Static task
static1
General
-
Target
Junkctrl.zip
-
Size
33KB
-
MD5
bc64c6ecf0cf11398e31510b5aa9d99d
-
SHA1
4abe7cbd9f242bc5f739e24b17d2c88af5feaaba
-
SHA256
0c3b06152f1bda30f8ad47d8f5e0f914e12f00f54609d0595ea87e09d658df4b
-
SHA512
0fde6e08b8071531e2ed248cd0ae716a8697f0f2e16a1843da88480c86ff1f298b80f8d9b4a48bc2b9bee80581e373897cd95350a959ef4732161e5fe38209f8
-
SSDEEP
768:WX7vtqgaDjiuS4GS7ZDOeJVCPdzi0efe1e1KY0:Q7vYFjPGS7ZDdAdzi0Me1+G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Junkctrl.exe
Files
-
Junkctrl.zip.zip
-
Junkctrl.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
app/badApps.txt
-
plugins/HP Bloatware.txt
-
plugins/Microsoft Apps only.txt
-
plugins/OneDrive-App.txt.ps1
-
plugins/Scam Microsoft Store apps.txt
-
plugins/Unnecessary Windows Programs.txt