C:\lalojuhot_nojukone87\jinu.pdb
Static task
static1
General
-
Target
OSIRIS+MULTIHACK+-+CSGO+Free+Cheat,+ESP,+Aimbot...-PLND-AF5T02AhBQUABTwCAEdCFwAGACTxM_cA.exe
-
Size
4.5MB
-
MD5
789c1b6a7733674bccacca3fb77b42bf
-
SHA1
b582f100e260b97903a46cd181516ca651dbc267
-
SHA256
2b7927adf59eed47fbd313b680d13b3e77265abe6ea0434c6c226719cd0beb6c
-
SHA512
4f033ae5383d3d2ee465012a41b8adaccf23afc4f52c5f4ed59923e053ed6154b7346111a67e0c6e1b3902291ce0966667a32e2ee2982575e08cd0d111f0465f
-
SSDEEP
98304:zv5x5u90m6D89pzMCk56ia3A8UGuf2X+NNM7bs+fpOZ74eg5A:zBx5ui89F456jjvuY6Ab1fpVeg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource OSIRIS+MULTIHACK+-+CSGO+Free+Cheat,+ESP,+Aimbot...-PLND-AF5T02AhBQUABTwCAEdCFwAGACTxM_cA.exe
Files
-
OSIRIS+MULTIHACK+-+CSGO+Free+Cheat,+ESP,+Aimbot...-PLND-AF5T02AhBQUABTwCAEdCFwAGACTxM_cA.exe.exe windows:5 windows x86 arch:x86
239d0543c3c8f22bd3bf2a0ca25ae8f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
EnumResourceNamesW
SearchPathW
WriteConsoleInputW
CopyFileExW
TlsGetValue
SetEndOfFile
FindResourceExW
MapUserPhysicalPages
LoadResource
InterlockedIncrement
ScrollConsoleScreenBufferW
CreateDirectoryW
GlobalLock
GetCommProperties
FreeEnvironmentStringsA
SetTapeParameters
GetModuleHandleW
CreateNamedPipeW
LocalFlags
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetWindowsDirectoryA
WriteFile
SetCommState
GetCommandLineA
GetSystemWow64DirectoryA
WriteFileGather
CreateDirectoryExW
SetProcessPriorityBoost
InitializeCriticalSection
GlobalAlloc
LoadLibraryW
GetConsoleMode
GetCalendarInfoA
SetSystemTimeAdjustment
GetSystemWindowsDirectoryA
TerminateProcess
IsDBCSLeadByte
GetBinaryTypeW
GetOverlappedResult
CompareStringW
lstrlenW
LCMapStringA
GetConsoleOutputCP
VerifyVersionInfoW
InterlockedExchange
ReleaseActCtx
GetFileSizeEx
SetThreadLocale
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
GetProcAddress
SetVolumeLabelW
WriteProfileSectionA
SetComputerNameA
SearchPathA
BuildCommDCBW
GetLocalTime
OpenMutexA
OpenWaitableTimerW
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AddAtomW
FindAtomA
EnumResourceTypesW
SetConsoleCursorInfo
CreateIoCompletionPort
SetConsoleTitleW
FindNextFileW
GetConsoleTitleW
RequestWakeupLatency
GetConsoleCursorInfo
GetVersionExA
DeleteFileW
InterlockedPushEntrySList
GetProfileSectionW
AreFileApisANSI
GetVolumeInformationW
GetModuleHandleA
FlushFileBuffers
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedDecrement
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
SetStdHandle
WriteConsoleA
CreateFileA
CloseHandle
user32
GetMenuCheckMarkDimensions
GetMessageTime
GetMenuInfo
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ