C:\Users\Domin\source\repos\Hydrox\Hydrox\obj\Debug\Hydrox.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Hydrox.exe
Resource
win10-20240404-en
General
-
Target
Hydrox.exe
-
Size
53KB
-
MD5
6f5464f5081c0d55bcd32608717846af
-
SHA1
ab7ffb3125fea604060ddf2508e62a9b6a096455
-
SHA256
dad4f83b8d772290981a7db973c9f22f27ef20a4f4ac670970c901d8e06fc245
-
SHA512
645909c25d004b948f7d3b8a0732070e38baa92b2116b3276834ba8ffbb281bd14edc5c90f5218f7c22d95976121d02944b0b8cb6241edb8ffabf72cedc8f005
-
SSDEEP
1536:5zVlHAiddQcTxKchwsgVvU0IvkwhC1E7:5zVlHDFTQchwhVYsbE7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Hydrox.exe
Files
-
Hydrox.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ