C:\Users\Elijah\source\repos\YTexe\YTexe\obj\Debug\YTexe.pdb
Static task
static1
General
-
Target
Example Exploit.exe
-
Size
27KB
-
MD5
87e51c62b2bc5020af9296c402dec1e8
-
SHA1
c9576930151202cc9b632ce14c56142a2505578d
-
SHA256
c95a59f32aff2c79e7dbf06e7a515818a3fd834ca65a01d7a8b41c6c63730e0c
-
SHA512
de7912df63f4042fc44c7a572b9ffa88ecf525a5e956a2c290f4d4ed165feabc2ccc82123f6a0927b332a96dbb2f685dca2bcb23784e4d739311933478b9af1d
-
SSDEEP
384:nhrZlFiHlomUvyuXvR4D0HCokwLwgCCCCCu1wAcOWOLv5qQWlo5haR/dhGbT/sHr:flFiFotRC0S/O9mlGImbIotk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Example Exploit.exe
Files
-
Example Exploit.exe.exe windows:4 windows x86 arch:x86
Password: 12311
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ