C:\Users\Unknown\Desktop\ScreenFuck-master\obj\Debug\ScreenFuck.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ScreenFuck.exe
Resource
win10-20240404-en
General
-
Target
ScreenFuck.exe
-
Size
215KB
-
MD5
f95ca5d3a95605d82e06906f9d88d979
-
SHA1
274c371db7fd94ff7c4efb2bc193edebd1c89ee1
-
SHA256
8292ca8b3528ee868c3932bd5ae3c63a6769f5a648901f96f065ad79763a5705
-
SHA512
f650a9f2c9666ce830b0bb13ab747b5df411024c32f7272f5e2f637d29a95631522b44aa87f146a682d4d3a4b1cb9387c5bd86f5faa153b7a29d26c83188b753
-
SSDEEP
6144:t9JmtIpDJR2Su3fqn3cZF8+CzHcE2WokjpG8kowT:wST7u3i3FHXodz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ScreenFuck.exe
Files
-
ScreenFuck.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 213KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ