C:\Users\joao\Desktop\free\Private cheats gratis\Private cheats gratis\obj\Debug\Private cheats gratis.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a38cd577daedc04ceaaf57b13591c9ee988dfa32604271accb390f06b68a085.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a38cd577daedc04ceaaf57b13591c9ee988dfa32604271accb390f06b68a085.exe
Resource
win10v2004-20240412-en
General
-
Target
6a38cd577daedc04ceaaf57b13591c9ee988dfa32604271accb390f06b68a085
-
Size
1.3MB
-
MD5
848fabd45d4bffbfccefb7d6517ea681
-
SHA1
58867435897da06bdc8bd49355d589faf17fc2c3
-
SHA256
6a38cd577daedc04ceaaf57b13591c9ee988dfa32604271accb390f06b68a085
-
SHA512
bae7e969a907bdf9336d94e42098c220ee9754185109e2344171cf550b08f2e05fa1f6ddaedd73bf24a0bb3c1260f1694583ae66843e74cc6e5ad15b4eca5664
-
SSDEEP
24576:N+703TQcPTAcySiDNpfVkqgfPyU8/oa8reuaDWfw+Jwz/S/6i:S0D70nS4pfVkqgy6r3aww+W7SCi
Malware Config
Signatures
-
Detects executables Discord URL observed in first stage droppers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables manipulated with Fody 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Fody -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a38cd577daedc04ceaaf57b13591c9ee988dfa32604271accb390f06b68a085
Files
-
6a38cd577daedc04ceaaf57b13591c9ee988dfa32604271accb390f06b68a085.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ