C:\Users\okumu\Desktop\darky çalış artık\WindowsFormsApp1\WindowsFormsApp1\obj\Debug\WindowsFormsApp1.pdb
Static task
static1
General
-
Target
Darky.exe
-
Size
51KB
-
MD5
96735da7a8497057f964482f4731ebda
-
SHA1
a8ddf8fe60d3a7bebfa06ac0f3b3c333058bade4
-
SHA256
cf8dba65ca1d2129856167c30b407641baeadc10f24d8339d808430151748375
-
SHA512
ca017be2aa19c3245cab1b5333ad0647476724d845f2dc41cff3f081a917d2e4e1389c12f4f19113b5a6f05d387401e0dec9834d2f7e3dffd17b3eb887b577ab
-
SSDEEP
1536:U8qh2AbWi4K/ptwtLuoO7wB6HRAzG0W6snG6zr9g:U8qZbWi4KSSwB8AbIr9g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Darky.exe
Files
-
Darky.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ