C:\Users\danie\Desktop\Source ORIGINAL\Skisploit 2\Skisploit Cracked\Thunder Modz\obj\Debug\Thunder Modz.pdb
Static task
static1
General
-
Target
Elysian_v.2.exe
-
Size
408KB
-
MD5
72f3d552ef9df20d816ec956dd2005f8
-
SHA1
179e2b40fcd0b6557c2dcf93ecb832bf365cedb6
-
SHA256
67faddca0d197cec867198d620783b6985123c3383e5e0aa834f6d9e8268b13f
-
SHA512
5c1aebee87c9e9230ce897178126f8657417587abc614a5dde6d0412e23d889bf8650dea8721aebc436d5b8959c95aad590fda08f318038990070dbf4ec0e2be
-
SSDEEP
3072:0c5Nvn8gNyjjjbctcl0OIPGDtFmflfZW0OIPGDtFmflfZS:9EzGsrmflfZWzGsrmflfZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Elysian_v.2.exe
Files
-
Elysian_v.2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ