Malicious
Malicious

164dc4cd4bf6f6dd7e79a9941dc0a69b

AutoIt Compiled Script
|
MD5: 164dc4cd4bf6f6dd7e79a9941dc0a69b
|
Size: 1.06 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
164dc4cd4bf6f6dd7e79a9941dc0a69b
Sha1
e21a1d98e56f806082c319a251b9762270dec46c
Sha256
6efb5b284e5c36e0ebde123a65cd46944f3523992b64d9fdb4b12bbd834e121e
Sha384
f5ed0d1e1f74e2a54872c8e38b8c6e954c91d053de99ae2977ccae24b8153343c9b24399ec0e8953cd2b992571c4afb5
Sha512
91a243c1c40151f46f305adac7765c921f705ce8d3369c07f1114ce3bde87d559ae3e19b8393880cb3492dcd3f623a90ebfb6abd9085ffd48643ff4d022b3bce
SSDeep
24576:Ytb20pkaCqT5TBWgNQ7aiYdniI/femR6A:hVg5tQ7aiYMI/fr5
TLSH
FF25BF1373DD8361C7B25273BA66B701AEBF782506A1F96B2FD4093DE820122525E773

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut1510.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Artefacts
Name
Value
PDB Path

????

164dc4cd4bf6f6dd7e79a9941dc0a69b (1.06 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙