C:\Users\User\Downloads\FuckNiggas\obj\Debug\Eternal Executor 0.0.4.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Eternal Executor 0.0.4.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Eternal Executor 0.0.4.exe
Resource
win10v2004-20240802-en
General
-
Target
Eternal Executor 0.0.4.exe
-
Size
209KB
-
MD5
fefe6e7d1bfe077cbaf23884be3f0eb2
-
SHA1
35522065c5085164a0ab764ab9c52feda913fdbf
-
SHA256
d165ddb37310cee781535b81d3cea666ef28daec7aad991afb5b0e023fb4f9d0
-
SHA512
da57f628bf996057f57e19fdbc1892af915cabad90d95c7b8044e5414a68e0ae419ac364713302df3999d786b8047dee1ac479f6981d5e79f1fa0e567db72ccb
-
SSDEEP
3072:in+5Sq18usPZcXHa1397eQKMv8i9es1b1z:in+5SAXHa1397FN911b1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Eternal Executor 0.0.4.exe
Files
-
Eternal Executor 0.0.4.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ