s:\develo~1\ddos_bot\335949~1\bot_sys\bin\i386\bot_rootkit.pdb
Static task
static1
General
-
Target
f9de32f9c23a494610b63eab30e02731_JaffaCakes118
-
Size
9KB
-
MD5
f9de32f9c23a494610b63eab30e02731
-
SHA1
44e7589b848ef9cdea4a2ce19191921f809b9ea0
-
SHA256
f79b3e62b89238a292e1f11293128c16ffef5205df61b9cad7440196e3f7dd9c
-
SHA512
bbeb19593fb18fed1007aa33ede191ee15b14df384ba43b3e3ee521b073086ec3b998ecf951022e9b17e0eae582c9e608869903a7f7e13dbc116bef4578dec05
-
SSDEEP
96:ZtBZTOiCmFDdRFfgmyKRrou6XJ7SA7W3d2ofrBLmGsuehcSd/peMoAi+K/WhKrC8:ZtCY3rXqJWocavhBdE+hlxWh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9de32f9c23a494610b63eab30e02731_JaffaCakes118
Files
-
f9de32f9c23a494610b63eab30e02731_JaffaCakes118.sys windows:6 windows x86 arch:x86
eeb6d2a00a3f6d715d59ba7fd6b174b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmIsAddressValid
memcpy
ExFreePoolWithTag
KeServiceDescriptorTable
_wcsnicmp
IoFreeMdl
MmUnlockPages
ObfDereferenceObject
KeDetachProcess
MmMapLockedPagesSpecifyCache
MmBuildMdlForNonPagedPool
ExAllocatePoolWithTag
IoAllocateMdl
PsLookupProcessByProcessId
memset
PsTerminateSystemThread
KeDelayExecutionThread
RtlAnsiStringToUnicodeString
RtlInitAnsiString
IoGetCurrentProcess
PsSetCreateProcessNotifyRoutine
NtBuildNumber
KeTickCount
KeBugCheckEx
KeAttachProcess
PsCreateSystemThread
RtlUnwind
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 794B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 622B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ