C:\Users\Philipp\Documents\Visual Studio 2010\Projects\HTTPFlooder\HTTPFlooder\obj\x86\Release\HTTPFlooder.pdb
Static task
static1
Behavioral task
behavioral1
Sample
DDoS Attack_Standard.exe
Resource
win11-20240611-en
General
-
Target
DDoS Attack_Standard.exe
-
Size
7KB
-
MD5
96c1c6cba52837f8fa37ae285a5f8d2e
-
SHA1
db1eca343c975a51891b34bd6ca4400967d8f114
-
SHA256
766bf8f9f52f4c5a35b05fc59d669d8c4c57006897455a78a6cf55e48119a69a
-
SHA512
a8d3c3c1d88b16ffe1ab18f43338f832b36469e65b874760c61806a3d683bc648f24077564f5e57fe88031ffe87a5b2fb60ec5ff87443ba2828ae56688581c40
-
SSDEEP
96:ER963vgo2nSSrx8Km2gEyUsq+gGEu5N6ixx6k/HnYqEouSuzNt:ERc4HSSrxTm2gEyUb9zsoC6k/WV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DDoS Attack_Standard.exe
Files
-
DDoS Attack_Standard.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ