C:\Users\Marko Radovic\Documents\Visual Studio 2012\Projects\Email Combo Leecher [Coded By SyBeR]\Email Combo Leecher [Coded By SyBeR]\obj\Debug\Email Combo Leecher [Coded By SyBeR].pdb
Overview
overview
7Static
static
3Methode/EggCrack.jar
windows10-1703-x64
7Methode/EggCrack.jar
windows10-2004-x64
7Methode/Em...R].exe
windows10-1703-x64
1Methode/Em...R].exe
windows10-2004-x64
1Methode/Ko...te.url
windows10-1703-x64
1Methode/Ko...te.url
windows10-2004-x64
1Methode/Li...er.exe
windows10-1703-x64
1Methode/Li...er.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Methode/EggCrack.jar
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
Methode/EggCrack.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Methode/Email Combo Leecher [Coded By SyBeR].exe
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
Methode/Email Combo Leecher [Coded By SyBeR].exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral5
Sample
Methode/Kostenlose Proxyliste.url
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Methode/Kostenlose Proxyliste.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Methode/Link Leecher.exe
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
Methode/Link Leecher.exe
Resource
win10v2004-20240226-en
General
-
Target
Altmethode.zip
-
Size
1.3MB
-
MD5
e7dfa25aa3ad3a4e57c72272bb242e38
-
SHA1
af320ac5cb9b56f943ed1094cd097b61a8c4099a
-
SHA256
783b48db2884485c2c217df242918f4e689205d5da942e84f39087562215dad7
-
SHA512
31e84a93803536f46f5a0f0c847152378f28bb4309f913a61a617d99573213bc14e1e63b9561ed76e53decc385111e8b18c7ead05f302429c6c00d67ddcae2a7
-
SSDEEP
24576:3RNLhyTQc5xINMjqQfiJ17qGdArdO0sbmjBZG7TsdQ3sD2fnW0sQoNr6GD:3/G6NIHmio0sbmjQTsY/KQoHD
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Methode/Email Combo Leecher [Coded By SyBeR].exe unpack001/Methode/Link Leecher.exe
Files
-
Altmethode.zip.zip
-
Methode/EggCrack.jar.jar
-
Methode/Email Combo Leecher [Coded By SyBeR].exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Methode/Kostenlose Proxyliste.url
-
Methode/Link Leecher.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\Sebastian\Desktop\F A S T\P R O J E K T E\free alts grabber\LinksAusWebseiteAuslesen\obj\Release\Link Leecher.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ