Malicious
Malicious

174428837c8f982059da3d9b518c4f8a

AutoIt Compiled Script
|
MD5: 174428837c8f982059da3d9b518c4f8a
|
Size: 1.1 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
174428837c8f982059da3d9b518c4f8a
Sha1
9c704b8c8e19d00a801f312f9d7e465815027bba
Sha256
41eaa4d9ca00fdef1f8ac2b02ffbb0498b8ed8565916247c20b4a41beaa102a8
Sha384
4b5d6facd2b7d387da12e00725afb02a5f23cde6090152b1460b9875fe75678292ef012f9b5a69e9b573366d7d710a2d
Sha512
6893d026298663601264217747fb60e64b5b5cc92d0a50914ed9d7d504ed2fcdfd5eb82f3fb29573d5f319bdf960594921fe82fd9022ec38d1021f600e4eab4f
SSDeep
24576:Xtb20pkaCqT5TBWgNQ7aEogbaSnxTYlh6A:UVg5tQ7aEo8nTy5
TLSH
6735CF1363DD8360C3B25273BA25B711BEBB782506B5F96B2FD4093DF920162521EA73

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut3216.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ????

174428837c8f982059da3d9b518c4f8a (1.1 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙