C:\Users\zso\Desktop\perm spoofer sources\KreYzeSpooferTempV1\BernySpoofer\obj\x64\Release\KreYzeSpoofer.pdb
Static task
static1
General
-
Target
KreYzeTempLoader.rar
-
Size
13KB
-
MD5
b9d811f5bb0afbf854b9ed5ccbf09a37
-
SHA1
22aa2c7e1bf175cfce1831229590662dec20ff65
-
SHA256
32a5382989dc768666794d29ce3d0cc4b750c0d35654a4aa6839d51a55b7c1d5
-
SHA512
6f734fafb4e45dc73f57a22ce6da64ea85d12f3d42bcf74eefc93b90cf9b6a4663ffbecc51ce8700e030ec1dcbe32bb5743961fb8a2db3b6e030f150fd5bf1ef
-
SSDEEP
384:ifUkrY8PaDTRZik+omTW5HaclJ+PHAnGdhdA0hd:MrGnik+ovZaclygJSd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/KreYze Temp Spoofer/KreYzeSpoofer.exe
Files
-
KreYzeTempLoader.rar.rar
-
KreYze Temp Spoofer/KreYzeSpoofer.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ