Malicious
Malicious

022629ebfa4fea55ba87db1f223b3283

AutoIt Compiled Script
|
MD5: 022629ebfa4fea55ba87db1f223b3283
|
Size: 1.25 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
022629ebfa4fea55ba87db1f223b3283
Sha1
6e0e3e06600f97f519dd0fa747624681ec88a9e4
Sha256
a81497152c403cee17c51b92b6d337b080d19bb5b1105f563e42bbf7555c48cf
Sha384
fd3a17d54427d8313a5dbc29a8e8205ad1ad4c7a2dd99978afce8e34684a41d258f4f455e894384c8f5d42479927c476
Sha512
61c876e73e72fc71365a6fcab7cd6698593adeda00c4eb939be6c52c48d9ad5211787784cff698ca359c1d2bbbe6a93a87df578b0c5927563a0817c11a940d5d
SSDeep
24576:Q5EmXFtKaL4/oFe5T9yyXYfP1ijXdazV8vUOZaAeat:QPVt/LZeJbInQRazVR7
TLSH
EB45BF0273D1D062FFAB91334F5AF6115ABC79260127A62F13981DBABD701B1463E7A3

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
autC9EE.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: t$di

022629ebfa4fea55ba87db1f223b3283 (1.25 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙