C:\Users\aiden\RiderProjects\Dropper\Dropper\obj\Debug\Dropper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Dropper.exe
Resource
win7-20240221-en
General
-
Target
Dropper.exe
-
Size
1.4MB
-
MD5
afbd173e05ef8ddabbe10b90f93b6614
-
SHA1
718220c153e1eba3d978eb7d2eb884716797be9f
-
SHA256
9d89f838ab73933fc7a35b409e022dbb33e11c94c306ecfe9710e8ed3a82946e
-
SHA512
5d4f4dcbdf4acbdd84c3da5a8351ff5db0c5091dcb94eb6dfb7b019e0ba342bf74e0bd3eb5b4484e6247561e7325be90e8433ee42137e6cf56fc1d76f29eb31f
-
SSDEEP
12288:C0w1hc0h3LOAGkjwtBx5n4AYakafNh/ymPj/YDLm7GylDULvEd8oK/mngAmgIv:CCmwDRPjwuB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Dropper.exe
Files
-
Dropper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ