C:\Users\Water Bottle\Desktop\puie shit\Donkey\obj\Release\VTC V4 Spoofer.pdb
Behavioral task
behavioral1
Sample
VTC SPOOFER .exe
Resource
win10v2004-20240709-en
General
-
Target
VTC SPOOFER .exe
-
Size
33.3MB
-
MD5
b0a3e32c169748709c7b84c29038b725
-
SHA1
8b2aa60888dc4623ef51cdf1a91dbadcbcbcf12b
-
SHA256
28cbcdf9698dc1b485b1c25818e815290b950d2f64f37fb920f919ee35e7e67b
-
SHA512
dc406cf35f908a39f6867a4a884de0edfd3fc85bbbc6951666432de7f6da90781c8e75e3ff19933633e750ea6b4595c4b8ae73c431b33bf5f4e586db30ac9ece
-
SSDEEP
786432:tyLhI3S2/ImUtp4LImEac4Ae2B+D9cwcGjC+QW0R13DTOshzWQv:ALy3ktmaoAURckj/0DTTOMv
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VTC SPOOFER .exe
Files
-
VTC SPOOFER .exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 16.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 884KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.themida Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: 33.3MB - Virtual size: 33.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ