C:\Users\guill\Desktop\important\important\Slax paid temp spoofer source\Slax paid Temp Spoofer source\bitsync\bitsync\obj\x64\Debug\temp loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
temp_loader.exe
Resource
win10v2004-20240508-en
General
-
Target
temp_loader.exe
-
Size
3.1MB
-
MD5
072ae6f177553cd67bcac181b04c4eb2
-
SHA1
6aa514d82fd7fff44383b041ca16a59d8b64714e
-
SHA256
bc7bdd39659b43c912faa2a27320005715a74440c34ce6dc4bc79c24483af911
-
SHA512
5799604a3ac65b1501d81abc31da0ec09c7230c3d98c0391d99775139457e4a3d8337493fe2cf358a3d6af88ec3089e23ad4206490857e68bda621eafe7a121a
-
SSDEEP
49152:hR/lD6iq3pwviKKW40Fs2CwdD6iq3pwviKKW40Fs2CZR/RHNqoY7n:703OvibuFs7wM3OvibuFs7D3q57
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource temp_loader.exe
Files
-
temp_loader.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ