C:\Users\guill\Desktop\important\important\Slax paid temp spoofer source\Slax paid Temp Spoofer source\bitsync\bitsync\obj\x64\Debug\temp loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
temp loader.exe
Resource
win10v2004-20240611-en
General
-
Target
temp loader.exe
-
Size
3.1MB
-
MD5
8d33be5c6acdb678b92066f439f5045c
-
SHA1
9f3928e68b58316773acb3b6e0f293ef1aded605
-
SHA256
6666710e2683aede188589b94c1ac74d3f1fd0cba67a991e0875565ebb50fd27
-
SHA512
e027109507c1fd32891a86a9ad6a9b6403e7031d9760c7761039b7424e07ddbff3e18858f07cca148393564916c13406b47334729a750a844ce01185941c3e50
-
SSDEEP
49152:hR/lD6iq3pwviKKW40Fs2CwdD6iq3pwviKKW40Fs2CZR/RHNqoY7n:703OvibuFs7wM3OvibuFs7D3q57
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource temp loader.exe
Files
-
temp loader.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ