C:\Users\susana vfx\Downloads\Zeus-BasicSpooferSource (2)\Zeus-BasicSpooferSource\Spoofer menu test\obj\Release\Subzero temp spoof@ by andreu vfx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
TEMP SPOOF.exe
Resource
win10v2004-20240226-en
General
-
Target
TEMP SPOOF.exe
-
Size
17KB
-
MD5
84b2e9479ad4aa7cd2ab79df53689398
-
SHA1
471ce2d85750c1d6a489fc1002596419ae624651
-
SHA256
224695334499e88bbf8756b316422e71c3dfc2b21a24918e61b27b40ac862b66
-
SHA512
1490c3cae079f15829430dc836aafdff78deec53881fca85777cc858a4bab1af7733c4fd9993b4942baa0d4307a4ec50628f6c4754e876984aaf36f877a8bcfe
-
SSDEEP
384:OnEK8HZb/q1ssvs6PMWpE8oc5tu/sxi3hFW:On7ebi6PSMRlc5tu/sxYhY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource TEMP SPOOF.exe
Files
-
TEMP SPOOF.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ