C:\Users\kai\Desktop\New folder (3)\Ro-Astral\obj\x64\Debug\Furious.pdb
Static task
static1
General
-
Target
Furious.exe
-
Size
409KB
-
MD5
aa1010c32f2688becc7573a3989940bd
-
SHA1
0fbcbf86de9faa4cb290b5acfb165a5159d75c6c
-
SHA256
f875d3b27e1168aa6ba81828242b1ea4ec9f7d60a083dc3ad6f0f86bc26be857
-
SHA512
806b0e9f46a501c3c6a240a37689596cd32188218668bedbc400922921197d49a7a97935c88f723b0993468f3fa9ab1869b0c5d5a50f90d6dea9b36d102832c8
-
SSDEEP
3072:8plG5jEN9XhI0jULpZIKfX6IvFrO0u5GljKhhldtL4WER2lwa:8plGFEvj6peKP6IvVMGtKDftk7R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Furious.exe
Files
-
Furious.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 282KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ