C:\Users\rivar\Desktop\Yizuz Spoofer\Yizuz\obj\Debug\Raven.pdb
Static task
static1
Behavioral task
behavioral1
Sample
QB-Spoofer.exe
Resource
win11-20241007-en
General
-
Target
QB-Spoofer.exe
-
Size
1.5MB
-
MD5
258909037df5f213115b70a3ed86177e
-
SHA1
8149c5199ca238b22dbf2b22f209ea3afa699feb
-
SHA256
5cdafad615179353cd64c2b7bbed04802c7fcc82c2c934f5ead01602cc0d46c7
-
SHA512
3f3576052cfdc57d65eb386b5da8dfb26023ff0a02810130f994d96e41d5e84bfda23eee92d1a57467e215fcc965eab5dad539e513940e5034e4354d3dea2ee0
-
SSDEEP
24576:ffCW/QTcdOBw2WTQcPTAcySiDNpfVkqgfPyU8/oa8reuaDQkqjVnlqud+/2P+ANm:X9/QTNw2y70nS4pfVkqgy6r3askqXfdj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource QB-Spoofer.exe
Files
-
QB-Spoofer.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ