Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_63268cc0da14087ca20f5f471e3e2883_powerloader_vabushky.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-27_63268cc0da14087ca20f5f471e3e2883_powerloader_vabushky.exe
Resource
win10v2004-20240802-en
Target
2024-09-27_63268cc0da14087ca20f5f471e3e2883_powerloader_vabushky
Size
54KB
MD5
63268cc0da14087ca20f5f471e3e2883
SHA1
3b6852c67b16d9118524dd2881ae1fd1906bdc25
SHA256
592bc2b9fbacee890eaf269b71daddf0c5463513902d8bdebef96cd9fa7705ad
SHA512
5c3b79e3c02790873effa802def48648daa9375757e57191640c7e3c70aafc2d5a63697be4239f1c125db18f4a3403da44c3d0b91b632df4d945fb3e15ede896
SSDEEP
768:iG4wi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPC2:iGEo36pxZUk+OeOSc/Mn3FrGI12
Checks for missing Authenticode signature.
resource |
---|
2024-09-27_63268cc0da14087ca20f5f471e3e2883_powerloader_vabushky |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
strcat
StrStrIA
InternetOpenA
CheckSumMappedFile
VerQueryValueA
GetDC
EndPath
RegOpenKeyA
Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE