D:\Random GitHub Projects\EzPing Cracked Loader\EzPing Cracked Loader\obj\Release\EzPing Cracked Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ezping.exe
Resource
win10v2004-20240412-en
General
-
Target
ezping.exe
-
Size
6.3MB
-
MD5
2bd6857555922c383735781ac65f6815
-
SHA1
4b6716196bec722f262fd2e9388ed9ecd54b410d
-
SHA256
d630e0751df816caa05fd67f06acce68449a2df82608830ac338e7ec81cf05a2
-
SHA512
d70068375443bd115af63d4509e42de1cb517ee847e5c8f3f702d850e40ab954b4a54b66a7404c64ec63cb67eb5452922b9f2e96f65bd5fbb2241845be82ac69
-
SSDEEP
196608:HhNt0udbn3Zdo82vHflFx2s91uWZ84dd3dmp:HZ0udjZUFxz5Z8kop
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ezping.exe
Files
-
ezping.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ