C:\Users\Hamza\source\repos\Sinetic Bootstrapper\Sinetic Bootstrapper\obj\Debug\Sinetic Bootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SineticBootstrapper.exe
Resource
win7-20240704-en
General
-
Target
SineticBootstrapper.exe
-
Size
11KB
-
MD5
72d03bb8976d6a9dae0608e17578bd0f
-
SHA1
9afe333cb2a3348065b727c32621cb021b7a5376
-
SHA256
189452b759890e44953e0395335846a248857c4afd009ca9988861b310234faf
-
SHA512
bf2c74a87d3e5c81adffa5a240e7d654c758576241f19f5d849c1e6764516c854a246a0a4691e90309486a3ff90a88f0c756c46ac6f9f25e9093481d690b0000
-
SSDEEP
96:OD7Wf/WR2crOXOrBw0HhNlCxc6sRZ+I/8qynQ3SkgoCFjkHIVMVi3LtS39EzNt:c7W3peCkhkc6sjXbynQ3lvViotu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource SineticBootstrapper.exe
Files
-
SineticBootstrapper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ