z:\coding\moneyback\drvprot\release\stub.pdb
Static task
static1
General
-
Target
52a6a2dbf82df282eccd5492619b4fff_JaffaCakes118
-
Size
301KB
-
MD5
52a6a2dbf82df282eccd5492619b4fff
-
SHA1
934fc1a6c47ea2228512ea9abc029042ac207dd6
-
SHA256
69e2376a119482e63219e8c3fce8bf347293e14cb7829181fe562d045f0cd2fe
-
SHA512
e46c42e04065570e91c91cbea47f4ce7ba5505b512eb9e3acb01528cfdf9ab362e5a5102f78069675f4583f92d8ff011c02cafe52beff252b5663ea10b3d5e12
-
SSDEEP
3072:D4R6asWUW8i8spSeRmoChtKJVNfGr28SKQJXbbUg:w6EUWr82R4KDfc3jUXfr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52a6a2dbf82df282eccd5492619b4fff_JaffaCakes118
Files
-
52a6a2dbf82df282eccd5492619b4fff_JaffaCakes118.sys windows:5 windows x86 arch:x86
bb9804f5d80255b421a5a937f0529d37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
strcmp
RtlFreeAnsiString
RtlEqualUnicodeString
RtlUnicodeStringToAnsiString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
memcpy
ExAllocatePool
NtUnlockFile
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192B - Virtual size: 189B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 288B - Virtual size: 276B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 288B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ