C:\Users\alecazzz\Desktop\Malaia\Spoofer\obj\Debug\Malaia woofer.pdb
Static task
static1
General
-
Target
ZeroShop.exe
-
Size
50KB
-
MD5
2066aeea735bbf4b181284bdb3c678a6
-
SHA1
fa19eafb21b6a747cfd7a64a1c92e3d0cef6046a
-
SHA256
836a322aa619a9c4079f67a513fd582e0e527310f14b538c69fab0bd1ad20dd8
-
SHA512
f7af548c9620ad94359384c803b50d3edca73bb39b1f59da74a09e1e61b0bfc591073134912f449533a97d1e3bc07c3dd874bd616622756b6a5afd453e80d5fc
-
SSDEEP
1536:kEOdtq8u+vWACi2tVjDM8iIL85SXLwPeU:sbq8uwWY248iILiS8mU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ZeroShop.exe
Files
-
ZeroShop.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ