C:\Users\krono\source\repos\Bypassr\Bypassr\obj\Debug\Bypassr.pdb
Static task
static1
General
-
Target
Bypassr.exe
-
Size
551KB
-
MD5
653f9a5a287240186e1f871d2ae9515c
-
SHA1
65ac947078603ac8c4f1b31692bc0fa915e8e1ad
-
SHA256
fc09e760ae6444d85a95973ae288cfd80af9b1a590772f2072ad2d8a25545a35
-
SHA512
f254f0593885f727acd534a783e5e5c06e63ca241481f994bf69f66e3948e228f60b29a20a9c8c1d6c266701bf8bc02f1f2a9a1c7a0c6293714742f9fafb6ecf
-
SSDEEP
6144:GW6WhuXKIrrDD4nbVVpssl6RkaUtuowbK:cflrDaJjt6QO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Bypassr.exe
Files
-
Bypassr.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 382KB - Virtual size: 381KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ