C:\Users\VM\source\repos\BTCStealer - stringbuilder\BTCStealer\obj\Release\BTCStealer.pdb
General
-
Target
BTCStealer.zip
-
Size
1.7MB
-
MD5
af04b52b51e058402565d868a7bdc04a
-
SHA1
ed4b1aa3d1388b0d4399642a7e5da6099d46a92e
-
SHA256
9048b8c979b0362e43294fb4df45eaa87532e432909538e903656ee34f704ad5
-
SHA512
b61dd1f0f1315fafb126459838ab1e0c06637ab451d7390d80caa5a8f225b465053e4f7b227464a959cb4728516b53faa2a5db0c3ad359e032d1bdeb41ad10ec
-
SSDEEP
49152:EqC+Kld/Eaf0FvmWzsPdVHpGh77GQtNvIZo:EqC+KX/EafkCdVHYX3tNQy
Malware Config
Signatures
Files
-
BTCStealer.zip.zip
-
BTCStealer/BTCStealer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
BTCStealer/README.pdf.pdf
-
http://t.me/oxamabhattiDonation
-