C:\Users\mzala\source\repos\Wecker\Wecker\obj\Release\Wecker.pdb
Static task
static1
General
-
Target
Wecker.exe
-
Size
148KB
-
MD5
558a62b24094ef4f33e489338c679f60
-
SHA1
5b3aa8d0d28eb6ad143a25a38931558cbd801cf2
-
SHA256
494955d0994f95b80f3d6d4f0cf99806f7087b554ae80bcae1a7adb36afaae5b
-
SHA512
3a2af3ad8029f6c171cc59eda7f5f5c1b4563e4c4debbd4bc535a63cd061c1f954c3c0deabc19326f70bd19dab07e52e782fed1362b95e6558f4a9c52eae0c9f
-
SSDEEP
384:WL4be/udDJwSlE94uM+SD05Bc5878lWKkvwKwq6ugEhfIt99nTKTfdkaC0OY2X8+:WLCep9s0Y58gEhM9ubdCQ2X8aarhW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Wecker.exe
Files
-
Wecker.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ