E:\Projects\GetPassword\Debug x86\GetPassword.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c7fc4d220d7fd95e08e59b36e5303a60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7fc4d220d7fd95e08e59b36e5303a60N.exe
Resource
win10v2004-20240709-en
General
-
Target
c7fc4d220d7fd95e08e59b36e5303a60N.exe
-
Size
1.3MB
-
MD5
c7fc4d220d7fd95e08e59b36e5303a60
-
SHA1
621b275afd33cd3c26678a607d54d1bce41bcb68
-
SHA256
505cea23043a38c9de0a361b96b57f37d8013f004bfcceabca84130ba03fb3b8
-
SHA512
cbc8edda5d5d23a3ff54df6b892da3eda8735b8791ccc9d7c7f6b6e4794d48b64dfc3c3802e6eb509fa6300780fd122d8e9e6d1d31fb44e50460c090a4d65e75
-
SSDEEP
24576:HtwwrQ+QkARjedRdF4wV5Ci+g1Drr1yCT:HrPt4KD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7fc4d220d7fd95e08e59b36e5303a60N.exe
Files
-
c7fc4d220d7fd95e08e59b36e5303a60N.exe.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Sections
.textbss Size: - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 911KB - Virtual size: 910KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.xur Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE