h:\Data\Coding\uniloader\Loader\Release\Loader.pdb
Static task
static1
General
-
Target
aimbot.exe
-
Size
168KB
-
MD5
ca05dae1f407886dea9cf80610d0a5da
-
SHA1
e29543487dc80c1abac3c60cb1f2e1637f6d628f
-
SHA256
179d2fb548a44bb1a5309021d3046af7a50eac35d6e32ee529b4682b16e8dc51
-
SHA512
e7351cb6fc141b38f739524dfbb202c35d4d868694b5faea3b6eea78d2cbea337ebd5d07e0c639fe7e5e31a294f558c23fad66082a8386a1e6a7d47ffe7e097d
-
SSDEEP
3072:naEkQF1LfpDUfZmdMddedVMddhdSNqAOSPPddEjkI34iseddddeddr+OduIrGkU:FkQ7zdMddedVMddhdSNqAOSPPddEjkIC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aimbot.exe
Files
-
aimbot.exe.exe windows:4 windows x86 arch:x86
Password: ArabeCS
7bd5c95640b2707621d4765f07abba04
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
GetTickCount
OpenProcess
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
GetModuleFileNameA
WaitForSingleObject
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
VirtualProtect
LCMapStringA
HeapSize
SetEndOfFile
ReadFile
GetLocaleInfoA
GetCPInfo
GetFileAttributesA
CloseHandle
CreateFileA
CreateMutexA
GetLastError
CreateThread
VirtualFreeEx
Sleep
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
WriteFile
SetFilePointer
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
GetSystemInfo
VirtualQuery
LoadLibraryA
RtlUnwind
InterlockedExchange
GetACP
GetOEMCP
LCMapStringW
user32
MessageBoxA
DialogBoxParamA
DestroyWindow
EndDialog
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ