C:\temp2\temp\PSBypassCLM\PSBypassCLM\obj\x64\Debug\PsBypassCLM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f108541ceddf15c47d0b62dfeece9c0351106d8df195aefa91dbd5ebcfb47fa7.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f108541ceddf15c47d0b62dfeece9c0351106d8df195aefa91dbd5ebcfb47fa7.exe
Resource
win10v2004-20240508-en
General
-
Target
f108541ceddf15c47d0b62dfeece9c0351106d8df195aefa91dbd5ebcfb47fa7.exe
-
Size
33KB
-
MD5
fd1cf647f6b883dbcacb10e143f32f82
-
SHA1
6a188609b373583fe3a58e6aacb58e04cee97eab
-
SHA256
f108541ceddf15c47d0b62dfeece9c0351106d8df195aefa91dbd5ebcfb47fa7
-
SHA512
bce6ea19e7a095cf7d0ff197372da1876eb9e7272a111620c57b81a21dabd7634393b7f147c62d215741995fef3c605561d0f6a910be4af9040fb29927ec9321
-
SSDEEP
768:SvA/Hr0o5hoBeT94bdAVGDLCHgqG/gozD2M:SotfoBeTSemLCjGIod
Malware Config
Signatures
-
Detects executables containing bas64 encoded gzip files 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f108541ceddf15c47d0b62dfeece9c0351106d8df195aefa91dbd5ebcfb47fa7.exe
Files
-
f108541ceddf15c47d0b62dfeece9c0351106d8df195aefa91dbd5ebcfb47fa7.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ