C:\Users\W10\Desktop\Dropper\Dropper\obj\Release\Dropper.pdb
Static task
static1
General
-
Target
1_Dropper.exe
-
Size
2.8MB
-
MD5
31578351574db3fa555db02ff724d150
-
SHA1
ed3726474a4774e7a244e7aa43369c6ade422a60
-
SHA256
fb1d8cc8a9a82cb14a40df095c8c153ee6e024981ce23f5c210b0cf98e1e82da
-
SHA512
d6324afd39ea940121aa57e9e734913d95ffc7412a858542365c810378308d1571538ce2f64e1f66f85bb1ddf653e40cd9cb070138923a4f5bbba8a82469c0ef
-
SSDEEP
24576:wy2I3/bn+MjkzTKhti//IrxB9W+yM03Hzw7V9B9DNiqj6hz6a5KiOCVj8ZULQ:tR3z+MgzTKhoo9BlmwZ9BJYqehOadV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1_Dropper.exe
Files
-
1_Dropper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ