C:\Glider\Shadow\objfre_wxp_x86\i386\Shadow.pdb
Static task
static1
General
-
Target
adc513ec513c6214637e57f3e227fbf9
-
Size
3KB
-
MD5
adc513ec513c6214637e57f3e227fbf9
-
SHA1
434ba2f861cbf7c86a16493c5e1adfb5f5f67e12
-
SHA256
23b0f450c3c8d5a8f939b00e12b93a0e8d5ff9c9a5fdc3858f616fa8a2a6c058
-
SHA512
36c41bcab1d6deeca05b923b82a6002d3c6a4a19ed9573ea186394d362ca9ed3bd458dfc5cee89fd1ba1266134f9b9a48a2a5317e897596bc06d4ad3461ba687
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adc513ec513c6214637e57f3e227fbf9
Files
-
adc513ec513c6214637e57f3e227fbf9.sys windows:5 windows x86 arch:x86
ff3dfca311bc33a410039d03e2b7b12e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
KeGetCurrentThread
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
NtBuildNumber
KeServiceDescriptorTable
ZwQuerySystemInformation
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 338B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ