Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_1799a13498071b9b8e6c6d793ecac878_powerloader_vabushky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_1799a13498071b9b8e6c6d793ecac878_powerloader_vabushky.exe
Resource
win10v2004-20241007-en
Target
2024-10-13_1799a13498071b9b8e6c6d793ecac878_powerloader_vabushky
Size
54KB
MD5
1799a13498071b9b8e6c6d793ecac878
SHA1
64529652d1cf316bd207beac7a3f78044c1c328e
SHA256
e185ce6d6ac734b77be379f001c1bea8de42749656004805ec1696bc41708d20
SHA512
5e8d832629bc693d560b8865182bfc221d58aa339fbcc0a648f5f2bb256a55cab96b946e470f30411892080fcdf7144eeae33cbc77b4056ae464d8cdd32e1d49
SSDEEP
768:iGQwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPCp:iGso36pxZUk+OeOSc/Mn3FrGI1p
Checks for missing Authenticode signature.
resource |
---|
2024-10-13_1799a13498071b9b8e6c6d793ecac878_powerloader_vabushky |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
strcat
StrStrIA
InternetOpenA
CheckSumMappedFile
VerQueryValueA
GetDC
EndPath
RegOpenKeyA
Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE