C:\Users\rragt\source\repos\NETWebhookFinder\NETWebhookFinder\obj\Debug\NETWebhookFinder.pdb
Static task
static1
Behavioral task
behavioral1
Sample
NETWebhookFinder.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
NETWebhookFinder.exe
Resource
win10v2004-20240802-en
General
-
Target
NETWebhookFinder.exe
-
Size
6KB
-
MD5
8b14b60d17398702acb4f13d059feca8
-
SHA1
5cd57b4e4a8e9cefd325629469825ce3a55956fd
-
SHA256
bda3b24fa9c348bb74747e35ac72759e9ce5928f71d19021a531aec463d04f68
-
SHA512
951b62b211243c2077bb3e83f52d11ef9d5d002a4277b078f558f6452e2590c065c213f0f3abfc6ffef6699120ef78150557d5f3d9a549a7079920ada702fdab
-
SSDEEP
96:pRoMDbX/C/NfLcBJWwwlHYok4AuEvh7O3hTzNt:pR5m/NjcSPlHu45EID
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NETWebhookFinder.exe
Files
-
NETWebhookFinder.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ