C:\Users\yonob\source\repos\PlantillaChanchoV3 - DC HACKS\PlantillaChanchoV3\obj\Release\DC H4X.pdb
Static task
static1
Behavioral task
behavioral1
Sample
DC H4X.exe
Resource
win7-20240704-en
General
-
Target
DC H4X.exe
-
Size
5.8MB
-
MD5
1114340df3025db526d6f97ffbc78aab
-
SHA1
928d3561d156aebc1f1afe3ea4e8560dd854edef
-
SHA256
d1277b8aa538e250eba4829b1b4dc34f8b29b1133b461608108c9adeb1997074
-
SHA512
d72c295529b3900322cc8e474b741fce32927f15596e9020501caa14712862e1e5fc4c6a595018ed99a756abb9eeb4845fafca5703d73ee038f4db84ef52fab4
-
SSDEEP
98304:++/iQ8Ng8WIWcvoyvF/iO8BgGWWWEdo2VjIT4bNJFY3OqtUkqXf0F:+iILhEDrjBHYkkSI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DC H4X.exe
Files
-
DC H4X.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 5.8MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ