C:\Users\Biscuit\source\repos\SEKoya\SEKoya\obj\Debug\SEKoya.pdb
Static task
static1
Behavioral task
behavioral1
Sample
KakeLoader.exe
Resource
win11-20241007-en
General
-
Target
KakeLoader.exe
-
Size
84KB
-
MD5
310e7677d44e40fae30673e8fcd79a10
-
SHA1
fee5a6a2a74be4355e262a3f7c84c276af6a2cff
-
SHA256
629ae24a45958f653c5ef7941fb25d82f12175f5209351e729cf395a45e6ba39
-
SHA512
e3876c3e321af2142f04f26d6d7415f0dd3cbc285656f5925c962534660d70a7dd9ad2204301636cb79e3546360bebea6e36669c4d7e8d72090a982e62bd7e8b
-
SSDEEP
1536:4u7FTTT8M8RJWRNAP7Lp9j6mUE4a/xYJvJMFW0bDsCYU:4u7FTTT8M8RAR2xW1a/0MFWWd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource KakeLoader.exe
Files
-
KakeLoader.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ