C:\Users\Anna\Desktop\BypassLoad-main\BypassLoad\obj\Debug\BypassLoad.pdb
Static task
static1
Behavioral task
behavioral1
Sample
137dc8ef6d2678dd78ae8debad63254b6767bdffae61b9272e9bf3d8b5e7f46f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
137dc8ef6d2678dd78ae8debad63254b6767bdffae61b9272e9bf3d8b5e7f46f.exe
Resource
win10v2004-20240611-en
General
-
Target
137dc8ef6d2678dd78ae8debad63254b6767bdffae61b9272e9bf3d8b5e7f46f
-
Size
9KB
-
MD5
664a025b2ae6e2cba300c04422a57fd8
-
SHA1
e510b093e56e315d30b60cda26dcf5ad0292eaf7
-
SHA256
137dc8ef6d2678dd78ae8debad63254b6767bdffae61b9272e9bf3d8b5e7f46f
-
SHA512
2980d6439855c7b50dc803786f6e71af3c2bbf0564180708a61c6855f30f9022f0e1b44a91344604e40709417535318321e3c4d575e3c6eb1f3c9991a09ea765
-
SSDEEP
192:iFqlG4mnoHFECVCU8yKXbIqKeov20UVDrBN:1lGulECVCXAv20UVnB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 137dc8ef6d2678dd78ae8debad63254b6767bdffae61b9272e9bf3d8b5e7f46f
Files
-
137dc8ef6d2678dd78ae8debad63254b6767bdffae61b9272e9bf3d8b5e7f46f.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ