s:\developer\socks5_rootkit+bot\bot_sys\bin\i386\bot_rootkit.pdb
Static task
static1
General
-
Target
b6c70505df714874133fac609e17e30f_JaffaCakes118
-
Size
7KB
-
MD5
b6c70505df714874133fac609e17e30f
-
SHA1
4b2af3022d9f07d9d0e309802f8b3968d3a5f2a4
-
SHA256
9a9f3e76e41c00bb6e54cb71d32b024744e7957973026d0f024b46f3d21a8bff
-
SHA512
a782160f09bfc4afbcb7cc3ab9b8a3e2143e3f7daafc854c41962a2742010fe68bd8194fa68efe8ec65187f44a4b841a443b8d2dcf7bdbeeec72487b72d42172
-
SSDEEP
192:UnEBjqLkqUcAhng4/ztlXDuYo3zTRKzCq/LUzqnOwKJj1zJqn:vuLkqUcAhg4/ztxDu3nRKzVozcKJhzJq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6c70505df714874133fac609e17e30f_JaffaCakes118
Files
-
b6c70505df714874133fac609e17e30f_JaffaCakes118.sys windows:6 windows x86 arch:x86
afebc3f4a4f111aa201c2b393f5e460d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
PsCreateSystemThread
ExAllocatePoolWithTag
MmIsAddressValid
memcpy
ExFreePoolWithTag
KeServiceDescriptorTable
_wcsnicmp
IoFreeMdl
MmUnlockPages
ObfDereferenceObject
KeDetachProcess
MmMapLockedPagesSpecifyCache
MmBuildMdlForNonPagedPool
KeAttachProcess
IoAllocateMdl
PsLookupProcessByProcessId
memset
PsTerminateSystemThread
KeDelayExecutionThread
RtlAnsiStringToUnicodeString
RtlInitAnsiString
IoGetCurrentProcess
PsSetCreateProcessNotifyRoutine
NtBuildNumber
KeTickCount
KeBugCheckEx
RtlUnwind
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 794B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 438B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ