C:\Users\boris\documents\visual studio 2017\Projects\CookieClicker_Hack2017\CookieClicker_Hack2017\obj\Debug\CookieClicker_Hack2017.pdb
Static task
static1
General
-
Target
CookieClickerHack.zip
-
Size
20KB
-
MD5
a7bcca47b5413eb92250a45f86d1ab75
-
SHA1
915ad4c18ae188da9ab338ced6862c4efb670091
-
SHA256
b7f82523253c3a1f18de5c649a96132820d89274cdf7a8c5cd3f47a79e76ed39
-
SHA512
4a666fe25bbaf41ff217a07bdd19fd9e2f57dba228511d9ae92d3ee75adaeb952fd91d4d4472e0c73babfb86806d54ddbe3d603ae124545b89ebdf570db19d87
-
SSDEEP
384:72qcAX5/Rmfcy2nbEL/m9iFnOBCBCV/OazL6k7DtAI:KAXhRsLQbELIisf/OC6k7DtAI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/[email protected]
Files
-
CookieClickerHack.zip.zip
Password: mysubsarethebest
-
[email protected].exe windows:4 windows x86 arch:x86
Password: mysubsarethebest
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ