e:\crazy\sources\chmod\objfre_wxp_x86\i386\wiiinnnzzzz.pdb
Static task
static1
General
-
Target
b56faad7a6c7f253c61660d5a83436ba
-
Size
7KB
-
MD5
b56faad7a6c7f253c61660d5a83436ba
-
SHA1
e166c1e1060f67cabb22f5b6e2a5b833a136e695
-
SHA256
3d6b39038590367bf998af80a4ed67aaf4a572dddc8948a1ca746300c2862810
-
SHA512
15962c551c1d6d0c779d20e19170b911198f444cab42125382a643db68d80e0c1e765c9b096ddf45165d9dbde1a8c1616da386eb2cb0b5b86e01d3b5534ccd22
-
SSDEEP
192:xs1slP0ECWUKcVJsQpyjNbayOPNYMqeq:xEuCUOyj5iPNxq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b56faad7a6c7f253c61660d5a83436ba
Files
-
b56faad7a6c7f253c61660d5a83436ba.sys windows:5 windows x86 arch:x86
61ce4f9114d23d43a47a4ef6b8631596
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwDeleteFile
KeTickCount
RtlInitUnicodeString
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 127B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 256B - Virtual size: 200B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ