C:\Users\White Cat\source\repos\STA Chat Bypass\STA Chat Bypass\obj\Release\STA Chat Bypass.pdb
Static task
static1
General
-
Target
STA Chat Bypass.exe
-
Size
14KB
-
MD5
5f293464ab08e2afbc46ba74a011a703
-
SHA1
e4ede03441e67ff1dad825b50fe7c1f256a3c446
-
SHA256
4aa98fed7232c1498bab44ba7cdb2598468287e8de1082d6d6e0aabf8eba546e
-
SHA512
4e4052e68c406e98b98ae905e43bc64354677bd4a24c1749198ed0bbe273100c7e0cfd20a574b4a5f06ea70fcf7a77dc6c0d0371323860b518b063a277f23f41
-
SSDEEP
192:c8B0PTrI7/zMyAlA1dodES4aixA+Af411Lg5bbVcbfxzwE:c8OI7LMyAlOOEbpxA+x11LAbV6fx0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource STA Chat Bypass.exe
Files
-
STA Chat Bypass.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ