F:\keep\spoofer sources\exposing clowns multi pages src\exposing clowns multi pages src\first spoofer from scratch\spoofer\obj\Debug\spoofer.pdb
Static task
static1
General
-
Target
spoofer.exe
-
Size
930KB
-
MD5
1ee4444a27a0e0ab64a9029e00f1a1eb
-
SHA1
13ad357c72948c4be6aba0b501024026a1eda1ab
-
SHA256
58a7f833694505b43851cb4e0e154edc738d230cfbc82773ab2fff487a17e872
-
SHA512
d8ba0055d042265bee6faaea2d26bc27f260f02a6880f5d29dcfbd1bf190577770f3830d8abbf3ab4c10c7f0689be8c739d43ec44d1373c5c8a78284533ab505
-
SSDEEP
12288:lfqo1CZrsXcKxjDV1jzglCqo1CZrsXcKxjDV1jzgl:lC9UhjO9Uhj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource spoofer.exe
Files
-
spoofer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 928KB - Virtual size: 927KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ