C:\Users\hugoh\Desktop\legacy spoofa src\spoofer\obj\Debug\JkSpoofer.pdb
Static task
static1
General
-
Target
JkSpoofer.exe
-
Size
255KB
-
MD5
324b7add8235b309fd353d3960cebd09
-
SHA1
e9d9339b82a24c9dacc4df320c2c95b560f0e6a6
-
SHA256
9c4d4a2626a4c9d9814bb2e98247171b9cd9738bd0294014fa9ed27e746362fc
-
SHA512
4769081759cf1e086086510917bd7f08c69ed890b05481372f424a80421572d59a327e78c5b24ecea6f37c9147b03873d6258c195072f51e2d87dee2bafcb6db
-
SSDEEP
3072:7ZPzao7T1NMi8R4o+CQbnrUZX3qvT0/k3XbteeJsRE+G2Lz++KO5Ck3B:75t3178RtgrUZX3IHbMeX+G2LP15Ck3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JkSpoofer.exe
Files
-
JkSpoofer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ