C:\Users\james\Desktop\Goofy Mods Reborn\obj\Debug\netstandard2.1\SynxPRIVATE.pdb
Static task
static1
General
-
Target
GoofyModsREBORN.dll
-
Size
64KB
-
MD5
4d811230f351823dbc2ccdb4c0c829c1
-
SHA1
6b5359e35d7c16b6aed4a283990061f934d54289
-
SHA256
38ad7fcac3fa9bd2f55230231a61e9b834fb61a06567c19847afcb6ab865b677
-
SHA512
b3cca76ced8aec28b63fe15ff02d6b771b53746bbf2f3208620dff0924e44cc689acf091acb890447d9c4b5c816b47fa363077066d3c93ea6827a59b8c0e0233
-
SSDEEP
768:rLg2Xo14j6iAhs95BhYf/2lmFkjLfFCorZ:YImiL5BhY38mFKCMZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource GoofyModsREBORN.dll
Files
-
GoofyModsREBORN.dll.dll windows:4 windows x86 arch:x86
Password: zavsfree
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ