Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_0592dd404292180d70b21405480a254d_powerloader_vabushky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_0592dd404292180d70b21405480a254d_powerloader_vabushky.exe
Resource
win10v2004-20241007-en
Target
2024-10-12_0592dd404292180d70b21405480a254d_powerloader_vabushky
Size
54KB
MD5
0592dd404292180d70b21405480a254d
SHA1
eba3c577b46e8ee7d0f922394b1d9f0a00724b56
SHA256
90d4f28710e66d44261f90e312cd8ab3b91c3026a133154f229160e0c6c1b560
SHA512
3b87d269a219c78b2ec52c7ea3df843ba383f11673dd086fc35f50fd6bda71271de4cc21e6fbffacf7644b78e662114503371b4f4733f215ba6f8594a1c033ef
SSDEEP
768:iGpwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPC:iGPo36pxZUk+OeOSc/Mn3FrGI1
Checks for missing Authenticode signature.
resource |
---|
2024-10-12_0592dd404292180d70b21405480a254d_powerloader_vabushky |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
strcat
StrStrIA
InternetOpenA
CheckSumMappedFile
VerQueryValueA
GetDC
EndPath
RegOpenKeyA
Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE