D:\P4\AK_FINALPC\depot\Alaska\Runtime\REL\FINALPC\Code\GameProjects\Alaska\Alaska_PC_External_Unity\Alaska_PC_External_Unity.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f7fedb86114f506720cbd591b4740d358dad52b6c75781dc710cc407719fff74.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7fedb86114f506720cbd591b4740d358dad52b6c75781dc710cc407719fff74.exe
Resource
win10v2004-20240802-en
General
-
Target
f7fedb86114f506720cbd591b4740d358dad52b6c75781dc710cc407719fff74
-
Size
9.3MB
-
MD5
d11a2662aaf036be607285838827e199
-
SHA1
6c69269c1bc90ff1eecc22e35cca099b5b0603b4
-
SHA256
f7fedb86114f506720cbd591b4740d358dad52b6c75781dc710cc407719fff74
-
SHA512
878c9e68dcba813ccc81a9cd6284365378f255947abd82392221d08dc056642bbd88dca12f23b9b45991a0096fd246f552e1371225ece5c7838a7aaac6f7d3c9
-
SSDEEP
196608:GcCOz8jh9idJSZs8mSRPgFeFeFeFeFeFeFeFeFeFeFeFeFeF:Zz8IJgf960000000000000
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7fedb86114f506720cbd591b4740d358dad52b6c75781dc710cc407719fff74
Files
-
f7fedb86114f506720cbd591b4740d358dad52b6c75781dc710cc407719fff74.exe windows:5 windows x86 arch:x86
bc278b945be01815d685d01c70360302
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
d3dx9_42
D3DXGetShaderConstantTableEx
dinput8
DirectInput8Create
xinput1_3
ord2
ws2_32
getsockopt
winmm
timeBeginPeriod
user32
GetQueueStatus
gdi32
GetStockObject
advapi32
RegOpenKeyExA
shell32
SHCreateDirectoryExA
ole32
CoInitializeEx
oleaut32
SafeArrayGetLBound
dbghelp
SymCleanup
d3d9
Direct3DCreate9
dsound
ord1
iphlpapi
GetAdaptersAddresses
Sections
.unpack Size: 4.3MB - Virtual size: 22.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE