C:\Users\abdullah.almandhari\Workstation\rsa\FileEncryptor\obj\Debug\IAMAHacker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-12_ea13404029e9f88e25c64f601a5ea7c5_petya.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-12_ea13404029e9f88e25c64f601a5ea7c5_petya.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-12_ea13404029e9f88e25c64f601a5ea7c5_petya
-
Size
1.0MB
-
MD5
ea13404029e9f88e25c64f601a5ea7c5
-
SHA1
cd256cb5985bbd3757bb7af11debe1104c64bc05
-
SHA256
59353ebb6a21badac7cfb1d89a5092eb1bc58b71f8dafa3ae9e2fad38f7dc20c
-
SHA512
74bfd29482e25e2a5af46910c63fddc3cd16eb657befa400529bd956db0bcbbdd2854c1c8c4e14fbb780c26f8b0ab67ae5bfab671f9d6c1993f3bea90fcc853a
-
SSDEEP
12288:flQDoXoLuMPYKHjlqXCcIjSOqXCcIjZ0KHjl:dooXQPsko
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-11-12_ea13404029e9f88e25c64f601a5ea7c5_petya
Files
-
2024-11-12_ea13404029e9f88e25c64f601a5ea7c5_petya.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 748KB - Virtual size: 747KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 290KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ