C:\Users\aiden\RiderProjects\Dropper\Dropper\obj\Debug\Dropper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Dropper.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Dropper.exe
Resource
win10v2004-20240611-en
General
-
Target
Dropper.exe
-
Size
12KB
-
MD5
13eb5be5584766a9f95d058b74c01fae
-
SHA1
859b917932b9ce6610a5eb90c315cfd4f728f200
-
SHA256
58d82fcd47e89b187c3d6aa5ab70d5ea876968d223490ac1b3b24e4c71715292
-
SHA512
ea1fc5c2c8b0194863b8bf68a4d432b269ac666bcd6d8dd65b1e2d5e4e1926ccc9b013e42f39f100b99ba106253d85c33d1ac6ec89d51f8023b73444fa3a5a6e
-
SSDEEP
384:pHPELyODmB7q9bJnz6PbQGw+pfolHfhhDd4VCsw:1EmO6s9bJMbK/hhDawsw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Dropper.exe
Files
-
Dropper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ