C:\Users\bukaz\source\repos\Navalny\Navalny\obj\Debug\Navalny.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Vibory.exe
Resource
win7-20240221-en
General
-
Target
Vibory.exe
-
Size
159KB
-
MD5
aed31f4095c122292a392df17053819a
-
SHA1
c820c2da165965faddb5e29842e217748f51c3b2
-
SHA256
80c54c67029154dd9364c7017e3700b9382a49f352d4b813ece3ec3a3498908a
-
SHA512
180498cc26ed82d2995d94d162ba293cb338b50beec3b0f4148635692eaff64058c78a3ebeec38ca25ea2b603890002346a73961babd9087a726efa30361b378
-
SSDEEP
3072:sre8T1DCKo2WRPsXxAU0RITB4l7tLV0I:we8SrR0B0Rflt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Vibory.exe
Files
-
Vibory.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ