Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_ddd267464a32a7200a3983f207110c80_powerloader_vabushky.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-12_ddd267464a32a7200a3983f207110c80_powerloader_vabushky.exe
Resource
win10v2004-20241007-en
Target
2024-10-12_ddd267464a32a7200a3983f207110c80_powerloader_vabushky
Size
54KB
MD5
ddd267464a32a7200a3983f207110c80
SHA1
9bdbb92da26d33133c799459e274b495684db7df
SHA256
b1d81e3ab22c43de04285e8716674845fcf37c5022e1e95307488c1ad27356c7
SHA512
5abff8044740bcaddb3f1d4cecbbaff14b08ed5af51483090ca2a4d2c88a15cff88c88f43bf225cd98bf565310f1f2e4928fe51960c93b35a6dc4c630cf76716
SSDEEP
768:iGwwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPC3:iGMo36pxZUk+OeOSc/Mn3FrGI13
Checks for missing Authenticode signature.
resource |
---|
2024-10-12_ddd267464a32a7200a3983f207110c80_powerloader_vabushky |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
strcat
StrStrIA
InternetOpenA
CheckSumMappedFile
VerQueryValueA
GetDC
EndPath
RegOpenKeyA
Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE