C:\Users\neymar jr\Pictures\FrozenTest\FrozenPermSpoofer\FrozenPermSpoofer\obj\Release\Star-White.pdb
Static task
static1
General
-
Target
Star-White.exe
-
Size
558KB
-
MD5
5527db0688897d830ad7bc28addb5f33
-
SHA1
5157420329ec1bf1373cf6ad95f6f8ff6286a2f6
-
SHA256
76e9e8c83559a11c614d9a5edefe388f7af5921b8886dc368a32d2fa6d97358b
-
SHA512
e75a1c2fdd7c054afae14edde1b6c3ad45f43b0c1905a06e3f5675cecb6c9f7a3042189cf1ccb788fc221b02040d7357dabba60512189705c0720a9ec9c11565
-
SSDEEP
12288:wORPXL9EqGT0ccyMZmd8sjhlDRa+hlDRxhWTOGYT0VE8Kd:p5EqGJd8kaggdhe8Kd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Star-White.exe
Files
-
Star-White.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 556KB - Virtual size: 555KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ