Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_8a145f10dada645f9bda8db6ccee3604_powerloader_vabushky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_8a145f10dada645f9bda8db6ccee3604_powerloader_vabushky.exe
Resource
win10v2004-20241007-en
Target
2024-10-13_8a145f10dada645f9bda8db6ccee3604_powerloader_vabushky
Size
54KB
MD5
8a145f10dada645f9bda8db6ccee3604
SHA1
21cec19e8480d22fceb3772f5aec804483d18707
SHA256
e4b04e1f9419a16cf9d057c5bda7f0c372b14d47b696d7c83537f68b0e473a0b
SHA512
665afed4f3efbb64974e3db41ac945d4d0aca51902fb68d8e34c762022121dab642f1fa44b8dfc73fac79de616204e1877efe3ae2b1a41d85948accfcc155f0d
SSDEEP
768:iGwwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPCM:iGMo36pxZUk+OeOSc/Mn3FrGI1M
Checks for missing Authenticode signature.
resource |
---|
2024-10-13_8a145f10dada645f9bda8db6ccee3604_powerloader_vabushky |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
strcat
StrStrIA
InternetOpenA
CheckSumMappedFile
VerQueryValueA
GetDC
EndPath
RegOpenKeyA
Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE