Static task
static1
Behavioral task
behavioral1
Sample
RAGEPluginHook.exe
Resource
macos-20240711.1-en
General
-
Target
RAGEPluginHook.exe
-
Size
9.9MB
-
MD5
fb9f38bc0fcc4c5b89e45c44b89963f4
-
SHA1
7fdbc8cbb3ed10dd691a261799403e7000c72972
-
SHA256
c284844d4cb311b8f6767215e5f0fc0e0c66ad562240488c7ba3f46f9f2e11bd
-
SHA512
62521d50b8b04650cbd4f3171f200f872370062897cd9db87bc73ad4cb2a6cd17b03b1a4002f300d8f44a3fcf5acf36401d42ef2e2d5ff0269d3724cf495ea75
-
SSDEEP
196608:cVPldd3SLGZ4Cc0S6LxLK7bt5nIjWd4/1Uzq/LeTraEnGurl:cVP7sLE41369evH4dUzqzOGup
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RAGEPluginHook.exe
Files
-
RAGEPluginHook.exe.exe windows:4 windows x64 arch:x64
Password: 123
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
�%�W�`�� Size: 9.2MB - Virtual size: 9.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
h�{��n Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ