C:\Users\Minec\source\repos\Mr. Steal Yo History\Mr. Steal Yo History\obj\Debug\Mr.Steal_Yo_History.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Mr.Steal_Yo_History.exe
Resource
win7-20240704-en
General
-
Target
Mr.Steal_Yo_History.exe
-
Size
27KB
-
MD5
7986c726d620291cbbeb1e583eb8a425
-
SHA1
b0490820b9edd0a3c17ff6d78336dc0b8f4765c8
-
SHA256
f0807123033daeebb1bba991ad6f4a454290f0342437805b1f70f21370c2b709
-
SHA512
f53bf2b5672b1ad32bc00840ef238d11f41ab4a5da09bcff7813b641441dffb3667a073be0334a18e3d84db182524c977f7dfb3a52423ec4923db9a57d19b26e
-
SSDEEP
768:2G8gE2rkwXENnWIuD1aLHZLaqtYcFmVc6K:20b8nvuDQMGmVcl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Mr.Steal_Yo_History.exe
Files
-
Mr.Steal_Yo_History.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ