Static task
static1
Behavioral task
behavioral1
Sample
Super%20OP%20Auto%20Clicker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Super%20OP%20Auto%20Clicker.exe
Resource
win10v2004-20240802-en
General
-
Target
Super%20OP%20Auto%20Clicker.exe
-
Size
16KB
-
MD5
4e35fa6cf79451fc637b4dfee1929935
-
SHA1
6af3db2bca2681ed4fd02f07604e042c12ae1a9e
-
SHA256
b64a5a053e6a36621d50f7deafb8f36f40fc1ed32ddc79f1b5014fe380244968
-
SHA512
5f2dd2348be41215f47d551228771d617a30508974dc6fe1041668db6838e06ea4ae914da4d3ded314d6f4fdc899726493c7ec2f71c6e962afda66b70cf1dca7
-
SSDEEP
384:q9TwZQYKmtGEEMxZdkVEhqKev04o5xV19lrHkxgAyb/IdukR:iTw+Y544VRA6/IdukR
Malware Config
Signatures
Files
-
Super%20OP%20Auto%20Clicker.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
3d:71:65:63:75:89:68:65Certificate
IssuerCN=4bf31907-9a63-422b-b030-91c9af658b93Not Before31/08/2024, 23:38Not After01/09/2025, 11:38SubjectCN=4bf31907-9a63-422b-b030-91c9af658b931d:be:00:0a:4b:9a:e6:f9:0d:91:71:c9:90:6a:69:9c:39:f5:9d:7e:ae:2e:05:6d:65:d0:a0:cb:8e:b8:cc:62Signer
Actual PE Digest1d:be:00:0a:4b:9a:e6:f9:0d:91:71:c9:90:6a:69:9c:39:f5:9d:7e:ae:2e:05:6d:65:d0:a0:cb:8e:b8:cc:62Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\grayo\source\repos\Super OP Auto Clicker\Super OP Auto Clicker\obj\Debug\Super OP Auto Clicker.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ