General
Structural Analysis
Config.0
Yara Rules0
Sync
Community
Summary by MalvaGPT
Characteristics
|
Hash | Hash Value |
|---|---|
| MD5 | 1ae35720f19de7c28592da4588fd2963
|
| Sha1 | 9fe5f61634d9eb5c6a0594b736f844de10f7beed
|
| Sha256 | 6242051c4bccec96cd7703c7387bbf31deb6fac3d8e6e0f88de287edea153653
|
| Sha384 | 47b1de64aeb84d423818b7365cafae7793c18bb99e7242a08cca664aec1e2c15e6666cbf25b954d3e2e2d68ac800cde6
|
| Sha512 | e21c605b4b0099ae377f2825af9ef71ef5c52927fa7d2da07abf230aee5d1e2deb76be92070de8d3a5eea1b3b2eda2eff4f573288a27f13242bde7417e6567d8
|
| SSDeep | 12288:XBhE8MzhZOM83q3agsFj+imZnllFywM7d6nlP4/fYF01J6XVFhXhn4JhaRebaEze:xhE8MVoMDsB+im3lFywUd6nlP4/fYF0u
|
| TLSH | 8BE44A3AA3E45855E26FC27B8A838292FE727C11272092DB1550937D2737FF76A39710
|
PeID
HQR data file
Microsoft Visual C++ v6.0 DLL
Microsoft v12.00 64bit C++ DLL - sign ASL ( 64 bit )
File Structure
1ae35720f19de7c28592da4588fd2963
[Authenticode]_318821a8.p7b
Overlay_c46c9daa.bin
[Rebuild from dump]_d1205ddc.exe
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.didat
.rsrc
.reloc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.didat
.rsrc
.reloc
Resources
TYPELIB
ID:0001
ID:1033
RT_VERSION
ID:0001
ID:1033
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader FAIL, AsmResolver Mapped OK |
| Info | Authenticode present at 0xAB000 size 14776 bytes |
| Info | Overlay extracted: Overlay_c46c9daa.bin (1608 bytes) |
| Info | Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_d1205ddc.exe |
| Info | PDB Path: CLBCatQ.pdb |
Artefacts
|
Name0 | Value |
|---|---|
| PE Layout | MemoryMapped (process dump suspected) |
1ae35720f19de7c28592da4588fd2963 (716.8 KB)
File Structure
1ae35720f19de7c28592da4588fd2963
[Authenticode]_318821a8.p7b
Overlay_c46c9daa.bin
[Rebuild from dump]_d1205ddc.exe
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.didat
.rsrc
.reloc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.didat
.rsrc
.reloc
Resources
TYPELIB
ID:0001
ID:1033
RT_VERSION
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
Artefacts
|
Name0 | Value | Location |
|---|---|---|
| PE Layout | MemoryMapped (process dump suspected) |
1ae35720f19de7c28592da4588fd2963 |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.