C:\Users\ukila\source\repos\My Executor\My Executor\obj\Debug\My Executor.pdb
Static task
static1
General
-
Target
DripExploitV2.exe
-
Size
18KB
-
MD5
78795840a92a00e2777bc40ddffc3f5d
-
SHA1
46c3391611d3672352d26e29affe90b3d1386f8a
-
SHA256
5ed0e371e1be052e5d3bfb3a7d8376cc3c7b48e2a02c00222746c4114ffcca00
-
SHA512
157def55d983e9fa6bacf631127c0d9049cc40a25ea40c6af61ad4ea187d212fe2e4734d69230a866c0a0640832948109e247e02ffaac4410502cdec5ab9dbf7
-
SSDEEP
384:IWKG6exMrTRDAsrYwTbdBasafrTz97AkLNFwgCCCCCu+ffRfd:I7DtPdle57BLaf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DripExploitV2.exe
Files
-
DripExploitV2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ