C:\Users\tolga\source\repos\External_IP_Check\Release\External_IP_Check.pdb
Static task
static1
Behavioral task
behavioral1
Sample
External_IP_Check.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
External_IP_Check.exe
Resource
win10v2004-20240910-en
General
-
Target
External_IP_Check.exe
-
Size
18KB
-
MD5
27806a2932f40a546e7e9d63271743a3
-
SHA1
47b777ca12e1f577772f8f1b01b5e387419cb57e
-
SHA256
e7673c880ee230d32c67ff76b859699b3045c4c242d24010279022186d98be63
-
SHA512
731d5f4376d8bf0b8d6148398e69b4eadb31504d045097d855979dedb486ffb3de1f7e1dfb9eaf52a0c5aa7ea9d70154592acbd4f089ed70b7f3976a931243c9
-
SSDEEP
384:yipKLFCFEugwrekebPQm+jS0g/U1g7aPGde22w:mYPIbPCg/N7dde2h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource External_IP_Check.exe
Files
-
External_IP_Check.exe.exe windows:6 windows x86 arch:x86
Password: infected
f87b987946a61e669a07426f87e63bcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp140
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEHXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?_Xlength_error@std@@YAXPBD@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Xout_of_range@std@@YAXPBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
ws2_32
WSACleanup
closesocket
WSAStartup
send
socket
getaddrinfo
recv
connect
vcruntime140
__current_exception
__current_exception_context
memset
_except_handler4_common
__std_terminate
__std_exception_copy
__std_exception_destroy
__CxxFrameHandler3
memcpy
_CxxThrowException
memmove
memchr
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_exit
_c_exit
_controlfp_s
terminate
exit
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_initterm_e
__p___argc
_seh_filter_exe
_cexit
_crt_atexit
_invalid_parameter_noinfo_noreturn
system
_initterm
__p___argv
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_set_app_type
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
kernel32
UnhandledExceptionFilter
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
GetCurrentProcess
SetUnhandledExceptionFilter
GetCurrentProcessId
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ