Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_0ab641f3e6344d091cd9da7921121417_powerloader_vabushky.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-12_0ab641f3e6344d091cd9da7921121417_powerloader_vabushky.exe
Resource
win10v2004-20241007-en
Target
2024-10-12_0ab641f3e6344d091cd9da7921121417_powerloader_vabushky
Size
54KB
MD5
0ab641f3e6344d091cd9da7921121417
SHA1
6785d5c8dca99c09a289526d92ef15e1352f2d49
SHA256
8f61adac7255359b129c82ff154fd0a0cf78fa803b0a4f652c0c6dd382110d84
SHA512
5cc8fe1f0106bf7195b0cc888fad01b5785f68a13872dfd28181583fad6f4dd2a7e9d51c44788a3f47afbb4caf08c4714abc6fe2a1201de1b4eb47a055a7cc52
SSDEEP
768:iGWwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPCVM:iG+o36pxZUk+OeOSc/Mn3FrGI1VM
Checks for missing Authenticode signature.
resource |
---|
2024-10-12_0ab641f3e6344d091cd9da7921121417_powerloader_vabushky |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
strcat
StrStrIA
InternetOpenA
CheckSumMappedFile
VerQueryValueA
GetDC
EndPath
RegOpenKeyA
Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE