C:\Users\hacks\Downloads\Cookie Stealer @hackster_OP\Samsv1\amsiwala\obj\Debug\amsiwala.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2f4bbb809ab2bbfc7810c9893f7c3cc895e1edd2b9509828cd8bc3e3fd757f71.exe
Resource
win7-20240221-en
General
-
Target
2f4bbb809ab2bbfc7810c9893f7c3cc895e1edd2b9509828cd8bc3e3fd757f71.zip
-
Size
2.7MB
-
MD5
971baf4b5b79c4d19cc7bbd7dd896ed9
-
SHA1
95005decaa6aab7ae5c6dd8b9ac420327f990694
-
SHA256
d6f84a3e358e8c3b323d7b26d0c6c27f4bd65869067af89e4bf54ddb544e1b86
-
SHA512
1ce7b73f19f90419e2f7d4975f772f32a3807c16ed8270678c7abc9aadac87e4330c0ebc8b0357cb4cf9c78a1cd03a0f52d6438a65901c0f68529042ecad7870
-
SSDEEP
49152:BQBB5veLK48yW3Q8wMteca7Bbf6gC8zjb7+MPdMClF+HvJ7sqlSFxOrtYCh6146x:OBB5veLiysQxMtg7ZfvjGMZlF+VsqAFv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2f4bbb809ab2bbfc7810c9893f7c3cc895e1edd2b9509828cd8bc3e3fd757f71
Files
-
2f4bbb809ab2bbfc7810c9893f7c3cc895e1edd2b9509828cd8bc3e3fd757f71.zip.zip
Password: infected
-
2f4bbb809ab2bbfc7810c9893f7c3cc895e1edd2b9509828cd8bc3e3fd757f71.exe windows:4 windows x64 arch:x64
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ