Static task
static1
Behavioral task
behavioral1
Sample
RAGEPluginHook.exe
Resource
win10-20240404-en
General
-
Target
RAGEPluginHook.exe
-
Size
10.1MB
-
MD5
4c87b28c74d56ca170012cc49c8e2683
-
SHA1
31a1e99a038ca204d6367843b6e478f6035c61f6
-
SHA256
1f85431909b4ee610e5ec588f83c1f14526c0d92e85bff011c64ecf608b239b1
-
SHA512
af491551cfb4cf32965a23b17fb6e14e4e179bdf19e6b6260fa9fa03e1bda749a877008e2af8a90a693906118091ee4d994a238d24b6674b574efac188883e77
-
SSDEEP
196608:ZdmQ/v7kS7524LPq8+usGXJTxUmCwKIxW19DEpGqG+4zTItznvTBn:7mQ/voSvD+uF9XClyCpEpGP+STs79
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RAGEPluginHook.exe
Files
-
RAGEPluginHook.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
-����� Size: 9.3MB - Virtual size: 9.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
��?bέ+� Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ