C:\Users\OriginalPgr\Desktop\TaskILL.exe\TaskILL.exe\obj\Debug\TaskILL.exe.pdb
Static task
static1
General
-
Target
TaskILL.7z
-
Size
13KB
-
MD5
5696a49a53a8c491636c51b49ccf10bf
-
SHA1
d89c61fbe85cc573e65a76d3744681557be07718
-
SHA256
6a52c0ff53c7c1f777b818d64d05ba134604c3cb644ecdb97b2abbd88475864c
-
SHA512
77a4e5039e4c0902acd3c9cd31f0c5bf103c94f2c4b00faa2757e21a690ee8f9b23edc7ecc927bc1886617823c0515bc319dec3e84eedd184bed1ee3b29a6393
-
SSDEEP
384:QX+zqi0FRga7sxSy8D8PwP03mCmP/yeRant:QX+28a7eSy68Po9CQ/He
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/TaskILL/[email protected]
Files
-
TaskILL.7z.7z
Password: infected
-
TaskILL/[email protected].exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ