C:\Users\pitek\Desktop\Virus_Destructive\WormLocker2.0\WormLocker2.0\obj\Debug\WormLocker2.0.pdb
Static task
static1
Behavioral task
behavioral1
Sample
NeverLoseCracked [no cap].exe
Resource
win10-20240404-en
General
-
Target
NeverLoseCracked [no cap].exe
-
Size
116KB
-
MD5
83ae01e02a278e59eb79252fdcb9cc20
-
SHA1
3defaa1b28f9c84c53be8cd1bc49823216c3a823
-
SHA256
7a85dce7ea5b93ff36d117de8dadc113f050f5dabb76c363ada52727f0846f34
-
SHA512
ba2939d85f28f6803c9e9b7cfebcaeb3b61fbc52710f0d1efdd5c36638820e948ef438ee5ac0ba72de1e77463107395c05b8d4d0858424d74a627b2e8d8a1a35
-
SSDEEP
3072:z2Gcu7cIA5SvNmQGuI7hNVLokwLQLO3e/qY:U2voQ21NV0zUicq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NeverLoseCracked [no cap].exe
Files
-
NeverLoseCracked [no cap].exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ