C:\Users\Patrik\source\repos\test\KlutchWoofer\KlutchWoofer\obj\Release\EkraHWID.pdb
Static task
static1
General
-
Target
EkraHWID.exe
-
Size
3.8MB
-
MD5
18480cdce86e4531e7401adf05a0888e
-
SHA1
33e02ac31b93f9cd7d98689e71ac43adfa72a8f6
-
SHA256
65f4758f7d54cb771590371a303f36dab5b0a3aa155f2189ecc59ef1112cf873
-
SHA512
10968557ccc4420b6990d4e787a37153e6f3b66ec040ca4723ba7e5053f13f45d4e6ace4023039dc87c6e5cba37241808e869c882ab6a296637afcb0ad1110ad
-
SSDEEP
98304:LB2Rr4dPDbGqglbTf8pb+KH4kpc+DX/0H3:0REdLbKZL8pKKYOD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource EkraHWID.exe
Files
-
EkraHWID.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ