C:\Users\Unknown\Desktop\ScreenFuck-master\obj\Debug\ScreenFuck.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ScreenFuck.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ScreenFuck.exe
Resource
win10v2004-20240611-en
General
-
Target
ScreenFuck.exe
-
Size
216KB
-
MD5
2b005c159b4a37f1644a44e47631703c
-
SHA1
b507990dcd2f999040065b988ada0fa86816f35a
-
SHA256
3410fbaeb0ed6bcfbef9bfa31ca27c0751f3e6a3ddbd0b9bb04307a52f2fb8cd
-
SHA512
8a3e2a5b1e89e9f1206ab61ca8f735a4be191f42d0ee6e3655ff71a7928d063f130e2c720723c29a0aaea2c2fdb2a79f628613bf9de75841705d29a1675b90f5
-
SSDEEP
6144:49JmtIpDJR2Su3fqn3cZF8+CzHcE2WokjpG8kowT:HST7u3i3FHXodz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ScreenFuck.exe
Files
-
ScreenFuck.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 214KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ