General
Structural Analysis
Config.1
Yara Rules49
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Low
Hash | Hash Value |
---|---|
MD5 | 02598f00ab0df9d4140577996c1968da
|
Sha1 | a297976584f93ffd7ce2512452576a9c8f10cd42
|
Sha256 | 749af3b59eccdb2c5625afe9fcd959ac667915eeafc79f442617a5ce7612b27a
|
Sha384 | 0fa6fc5fa996429900211f873a5261a516e25dabaf2f7673f048b69ae2a7ef023f1751433a0046c34254bfb02519c050
|
Sha512 | 5eaf15ccb62c97df047a4c26c21e3f6ec4310a8ef09d5eb5f71826b5f5e574b378c4497f80957071d428577fa2ec5b8af917c58c57cad6a26838a69194a30418
|
SSDeep | 1536:5qs8OqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2S3teulgS6p8l:XHuOYj+zi0ZbYe1g0ujyzdk8
|
TLSH | 2BA35D20679C9F19EAFD1B74B4B2012043F1E08A9091FB4B4DC1A4E71FA7B865957EF2
|
PeID
.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
02598f00ab0df9d4140577996c1968da
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - RedLine Config.
Config. Field0 | Value |
---|---|
[Configuration Module Name] | EntryPoint |
[Configuration Module Full Name] | EntryPoint |
Informations
Name0 | Value |
---|---|
Info | PE Detect: PeReader OK (file layout) |
Module Name | Happy.exe |
Full Name | Happy.exe |
EntryPoint | System.Void Program::Main(System.String[]) |
Scope Name | Happy.exe |
Scope Type | ModuleDef |
Kind | Console |
Runtime Version | v4.0.30319 |
Tables Header Version | 512 |
WinMD Version | <null> |
Assembly Name | Happy |
Assembly Version | 0.0.0.0 |
Assembly Culture | <null> |
Has PublicKey | False |
PublicKey Token | <null> |
Target Framework | .NETFramework,Version=v4.0 |
Total Strings | 234 |
Main Method | System.Void Program::Main(System.String[]) |
Main IL Instruction Count | 3 |
Main IL | newobj System.Void EntryPoint::.ctor() call System.Void Program::Execute(EntryPoint) ret <null> |
Module Name | Happy.exe |
Full Name | Happy.exe |
EntryPoint | System.Void Program::Main(System.String[]) |
Scope Name | Happy.exe |
Scope Type | ModuleDef |
Kind | Console |
Runtime Version | v4.0.30319 |
Tables Header Version | 512 |
WinMD Version | <null> |
Assembly Name | Happy |
Assembly Version | 0.0.0.0 |
Assembly Culture | <null> |
Has PublicKey | False |
PublicKey Token | <null> |
Target Framework | .NETFramework,Version=v4.0 |
Total Strings | 234 |
Main Method | System.Void Program::Main(System.String[]) |
Main IL Instruction Count | 3 |
Main IL | newobj System.Void EntryPoint::.ctor() call System.Void Program::Execute(EntryPoint) ret <null> |
02598f00ab0df9d4140577996c1968da (97.79 KB)
File Structure
02598f00ab0df9d4140577996c1968da
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - RedLine Config.
Config. Field0 | Value |
---|---|
[Configuration Module Name] | EntryPoint |
[Configuration Module Full Name] | EntryPoint |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.