C:\Users\Daniele\Desktop\AdiosItem - Copia\AdiosItem\Release\ButtaAll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
[UG]MultiHack - Bot BETA 1/[UG][DEMO] MultiHack - Bot BETA 1.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
[UG]MultiHack - Bot BETA 1/[UG][DEMO] MultiHack - Bot BETA 1.dll
Resource
win10v2004-20241007-en
General
-
Target
9a6b0786c8cb5b03737cd34601f95ca3_JaffaCakes118
-
Size
2.9MB
-
MD5
9a6b0786c8cb5b03737cd34601f95ca3
-
SHA1
03f9c9339538f1f008fe176259a7de852dece6a0
-
SHA256
f71c1996a4b8d489c12b42ceb6acad09d309847400b0fd48e29569de4d2044c3
-
SHA512
5acafab6250cba41b6cf70da255099f285552eb0ed892140c9c940c87008042619df0ccb479d420aeb7a7a81ba97f7c2e4e01fd3d1ccd575f2d4ca5b27b4c1c0
-
SSDEEP
49152:6f1Z8aC8sFIifBy/R9uZ3+n4Fiw6WF8I0ro9wX/agtInYSUQHX3JcT7dSxACQ03T:6f7lClIifBMR9L4Uwn8Ihwv8nYSUQ3o0
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.exe unpack001/[UG]MultiHack - Bot BETA 1/[UG][DEMO] MultiHack - Bot BETA 1.dll
Files
-
9a6b0786c8cb5b03737cd34601f95ca3_JaffaCakes118.rar
-
[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 12B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
[UG]MultiHack - Bot BETA 1/[UG] Injector - PerX.ini
-
[UG]MultiHack - Bot BETA 1/[UG][DEMO] MultiHack - Bot BETA 1.dll.dll windows:5 windows x86 arch:x86
0ab04a909dbd9e7edf3c24b1caccf143
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Sleep
GetModuleHandleA
VirtualProtect
DisableThreadLibraryCalls
CreateThread
GetComputerNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
msvcp90
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
??7ios_base@std@@QBE_NXZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
??$getline@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@0@AAV10@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
msvcr90
_encode_pointer
_malloc_crt
free
__CxxFrameHandler3
memset
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
_encoded_null
__clean_type_info_names_internal
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_decode_pointer
sprintf
__CxxRegisterExceptionObject
remove
__CxxExceptionFilter
__CxxUnregisterExceptionObject
__CxxDetectRethrow
__CxxQueryExceptionSize
_cexit
__FrameUnwindFilter
memcpy
shell32
ShellExecuteA
msvcm90
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
mscoree
_CorDllMain
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
[UG]MultiHack - Bot BETA 1/~5mb~