Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_ac24a01011c799d4e95c98e20b53671c_powerloader_vabushky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_ac24a01011c799d4e95c98e20b53671c_powerloader_vabushky.exe
Resource
win10v2004-20241007-en
Target
2024-10-13_ac24a01011c799d4e95c98e20b53671c_powerloader_vabushky
Size
54KB
MD5
ac24a01011c799d4e95c98e20b53671c
SHA1
d5d126bb8c760b1cff0d7009a48191c9d3659338
SHA256
ce6db02bcb09352001a66f5c79c183147517294153bfc516186700f51daaacf5
SHA512
53fb1ec42296cb9f86d5cdb0bd6dd91b23552724814d17b1811310d65f81f6e936fef0cbfa6fe1cc43ac803b305b74efbf266e7a6b35f22bf74db80c0b225956
SSDEEP
768:iGBwi3kNYsGVnyM69cgFeyat3zBGwvnZXUk+EjeOScG3u/fClJM43FrGIgaEPC:iGXo36pxZUk+OeOSc/Mn3FrGI1
Checks for missing Authenticode signature.
resource |
---|
2024-10-13_ac24a01011c799d4e95c98e20b53671c_powerloader_vabushky |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
strcat
StrStrIA
InternetOpenA
CheckSumMappedFile
VerQueryValueA
GetDC
EndPath
RegOpenKeyA
Inject64End
Inject64Normal
Inject64Start
UacInject64End
UacInject64Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE