c:\gh0st3.6_src\server\sys\i386\RESSDT.pdb
Static task
static1
General
-
Target
caf8176b51a1c386c6d0991c6e10c2f9
-
Size
5KB
-
MD5
caf8176b51a1c386c6d0991c6e10c2f9
-
SHA1
7ceffd6338314c5cad65e2857acfdcd6fd79dd95
-
SHA256
d0c39a2ab4d27b97ebafb0e489b961cc91f650b11f7ac07d810d9b5d33884c71
-
SHA512
d865e2da88452c68bdb5d612454615f23c3c33755bb637871a841fc2585f8eb52fbbdece5bdcb30fdb7901cdc25dc9d8432ca879ee6dff785e8d1fb6f08b0597
-
SSDEEP
48:SHp34s6euMzgPEhvUcwTeg4zQdBCkKHosILYn4qfLRaSRIIVvby:Y4s6YhhvUcwTerQbXMrILdqfLD5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource caf8176b51a1c386c6d0991c6e10c2f9
Files
-
caf8176b51a1c386c6d0991c6e10c2f9.sys windows:6 windows x86 arch:x86
9b6e8d7e23a28b0a9b58feca49325c1e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
RtlAssert
KeTickCount
RtlUnwind
KeBugCheckEx
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 434B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ