F:\0\RK2\objfre\i386\MyRootKit.pdb
Static task
static1
General
-
Target
d3968e0abc935485df54dc324ca91973
-
Size
3KB
-
MD5
d3968e0abc935485df54dc324ca91973
-
SHA1
e462a6006677776bca90a8ca8453fce864f53dd6
-
SHA256
1286af806c86432bfeb2821bc52f6012c793928d291d97f09b41fe535da69241
-
SHA512
b0923eae8f4aa73f4a7aad987adff7fec5c1b19a244fdfd498a7e126888249146e98e85eda6b2aee51d1e688abee246b0f2de76938a088551a4b0cda9487c769
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3968e0abc935485df54dc324ca91973
Files
-
d3968e0abc935485df54dc324ca91973.sys windows:5 windows x86 arch:x86
7738bb3e359fb3dc2abe18da3b27fb07
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoGetCurrentProcess
ObReferenceObjectByHandle
PsLookupProcessByProcessId
ZwOpenProcess
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
ZwTerminateProcess
KeServiceDescriptorTable
ZwClose
RtlInitUnicodeString
MmUnmapLockedPages
IoDeleteDevice
IoDeleteSymbolicLink
sprintf
ProbeForWrite
ProbeForRead
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
MmGetSystemRoutineAddress
IoFreeMdl
IofCompleteRequest
hal
KfLowerIrql
KeRaiseIrqlToDpcLevel
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 255B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 700B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ