Suspicious
Suspect

03bc37c41f16d9d57995345f18a4aa4e

PE Executable
|
MD5: 03bc37c41f16d9d57995345f18a4aa4e
|
Size: 95.23 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
03bc37c41f16d9d57995345f18a4aa4e
Sha1
c067f8eb183a9dfc9cd455a882dccd9929cf1da0
Sha256
ee000adc82a8b416383531a5fa34bd319cd674801fed5735db5da2018d658437
Sha384
18da0618fcc4bb67efc3ae3b7a03b02eddbfb5bb49199330a21d6591b88bb350e7d2ab00fbd79b4d5f6efbb8204fd909
Sha512
da49cc47d038764dd9a10f676b9eeee0412e602fe5f188eed58d31d1fe89d97d7cac11c6eb2ee9f2462a934105bb49aef0023289fabbb053cc830cbc3ac66ca7
SSDeep
768:eY3AdBnkpjTMpALPGMtsas88EtNXhe9Y1mxCXxrjEtCdnl2pi1Rz4Rk3XsGdp4gM:CdRkVbPGHz88EbB1pjEwzGi1dDDD4gS
TLSH
7493D84977E56524E1BF5AF75471F2004F34B48B1602E39D88F219AA1A33AC44F89FEB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Void Stub.A::main()

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

1272

Main Method

System.Void Stub.A::main()

Main IL Instruction Count

25

Main IL

nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runx ldnull <null> ldftn System.Void Stub.A::timx_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thx ldsfld System.Threading.Thread Stub.A::thx callvirt System.Void System.Threading.Thread::Start() nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runy ldnull <null> ldftn System.Void Stub.A::timy_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thy ldsfld System.Threading.Thread Stub.A::thy callvirt System.Void System.Threading.Thread::Start() nop <null> call System.Void Stub.Fransesco::ko() nop <null> nop <null> ret <null>

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Void Stub.A::main()

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

1272

Main Method

System.Void Stub.A::main()

Main IL Instruction Count

25

Main IL

nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runx ldnull <null> ldftn System.Void Stub.A::timx_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thx ldsfld System.Threading.Thread Stub.A::thx callvirt System.Void System.Threading.Thread::Start() nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runy ldnull <null> ldftn System.Void Stub.A::timy_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thy ldsfld System.Threading.Thread Stub.A::thy callvirt System.Void System.Threading.Thread::Start() nop <null> call System.Void Stub.Fransesco::ko() nop <null> nop <null> ret <null>

03bc37c41f16d9d57995345f18a4aa4e (95.23 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙