C:\Users\Administrator\Desktop\Chromium_Stealer-main\Chromium-Stealer\obj\x86\Debug\WindowsApplication.pdb
Static task
static1
Behavioral task
behavioral1
Sample
WindowsApplication.exe
Resource
win7-20240611-en
General
-
Target
WindowsApplication.exe
-
Size
27KB
-
MD5
d00b72dc754f0506c992f1836259c767
-
SHA1
dc9506e1820f52b998e4e8aaeb77788ed54c1502
-
SHA256
144652a565e51a2bab95b156cb07991000e1d58041bd2a233268ca0cadc14f65
-
SHA512
d6263edc96e8bc7a0e7a32f09a4635e7e91a41326894104120d3f827c6e68f97cdc99f242447d9dd47534b5d0bcb2cce43113c55f192295f2f172bc24d4233b9
-
SSDEEP
768:B0li2PPQexQEz2nt7fKlwY6//K8qh1uW3ZsgmzN:B0liljYoRqv+N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource WindowsApplication.exe
Files
-
WindowsApplication.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ