C:\Users\danie\source\repos\seconddegub\seconddegub\obj\Debug\seconddegub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
jjsploit.exe
Resource
win7-20240708-en
General
-
Target
jjsploit.exe
-
Size
282KB
-
MD5
03c4434703f1a2edb8deccc20ee0599c
-
SHA1
d294604a0c98141ad2e087e1fe5b87eb2f1d14ae
-
SHA256
cb9f151e8d27b98d6dd7eda81787aec542889e68d6b80c73552a395f7b9a7af7
-
SHA512
982f865b433249856ce083bfe44e7e7515dc75ac83edbd21d3bf34a0d8b830c2f6cfeec8f2477df6c9f9872931818cbaa68d441b7881b9618da23adfdf23ede5
-
SSDEEP
1536:QFt3QCi9bKEfzyT+cyass/AZtjPd1SOne8UF:QF1Zi9LfzpcKtTSh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource jjsploit.exe
Files
-
jjsploit.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ