Suspicious
Suspect

1e6126e2a7e041ff1c1fa4178ea0119e

MS Office Document
|
MD5: 1e6126e2a7e041ff1c1fa4178ea0119e
|
Size: 8.66 MB
|
application/vnd.ms-office

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
1e6126e2a7e041ff1c1fa4178ea0119e
Sha1
87e3fe5a3ce4003f2663328fa17fc4397012d87d
Sha256
8986d305ceed84c8dbc430ae7caf31b645f22fe5c4c29bca869eaee9abc46585
Sha384
e1c668fb3d43be41eb3faf2302e084a5e6be11947a2da0a9b9eee720260eb7a9ee6907cf04a5e1db0b7c187d9792625e
Sha512
d299921d6f741e0ef96ffc3de1cb46fac1663e604fa60fb71b6f214730950f06706577cd06e45858902c21c80d9c811805cbc25aadad73826ebee4030c793b13
SSDeep
196608:USYHQvyYHplWBKzdDZVaQspidYza+qOgNQVwds5Q915wG:USYwvyeAKdDZVaL8dYEkwz57
TLSH
ED963342E8E31A37FD6FFAFBC2DD5C882870CE29FA2585A43680F16215B3394754A4D5
File Structure
Root Entry
䡀䌏䈯
tUzTEVdtKvexSnfvCDGu
LjxucWCVzMhNfCEEQks
[Authenticode]_6c865cc2.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_594cc9b3.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_5818b650.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.idata
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2052
ID:2052-preview.png
ID:0002
ID:2052
ID:0003
ID:2052
ID:0004
ID:2052
ID:0005
ID:2052
RT_GROUP_CURSOR4
ID:0066
ID:2052
RT_VERSION
ID:0001
ID:2052
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0002
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
_RDATA
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
䡀䈖䌧䠤
䡀㬿䏲䐸䖱
䡀㽿䅤䈯䠶
䡀䈏䗤䕸䠨
䡀䕙䓲䕨䜷
䡀䌍䈵䗦䕲䠼
䡀䒌䓰䑲䑨䠷
䡀㼿䕷䑬㭪䗤䠤
䡀㼿䕷䑬㹪䒲䠯
䡀㿿䏤䇬䗤䒬䠱
䡀䖖㯬䏬㱨䖤䠫
䡀䘌䗶䐲䆊䌷䑲
䡀䇊䌰㾱㼒䔨䈸䆱䠨
䡀䈏䗤䕸㬨䐲䒳䈱䗱䠶
䡀䑒䗶䏤㾯㼒䔨䈸䆱䠨
䡀䇊䌰㮱䈻䘦䈷䈜䘴䑨䈦
䡀䇊䗹䛎䆨䗸㼨䔨䈸䆱䠨
䡀䑒䗶䏤㮯䈻䘦䈷䈜䘴䑨䈦
SummaryInformation
tUzTEVdtKvexSnfvCDGu
LjxucWCVzMhNfCEEQks
y5HyK1u9bWw5XV
BQBeN2HZAf4OhpkXLUH
cmaddfenqmHzL7SASZ3X
oAXwuvJs0G9Yq0
BfAZLcj6cmu
fcQ7QFjth6YEfSFH7G
oFdLFrDuC
Artefacts
Name
Value
URLs in VB Code - #1

file:///

PE Layout

MemoryMapped (process dump suspected)

1e6126e2a7e041ff1c1fa4178ea0119e (8.66 MB)
File Structure
Root Entry
䡀䌏䈯
tUzTEVdtKvexSnfvCDGu
LjxucWCVzMhNfCEEQks
[Authenticode]_6c865cc2.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_594cc9b3.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_5818b650.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.idata
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2052
ID:2052-preview.png
ID:0002
ID:2052
ID:0003
ID:2052
ID:0004
ID:2052
ID:0005
ID:2052
RT_GROUP_CURSOR4
ID:0066
ID:2052
RT_VERSION
ID:0001
ID:2052
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0002
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
_RDATA
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
䡀䈖䌧䠤
䡀㬿䏲䐸䖱
䡀㽿䅤䈯䠶
䡀䈏䗤䕸䠨
䡀䕙䓲䕨䜷
䡀䌍䈵䗦䕲䠼
䡀䒌䓰䑲䑨䠷
䡀㼿䕷䑬㭪䗤䠤
䡀㼿䕷䑬㹪䒲䠯
䡀㿿䏤䇬䗤䒬䠱
䡀䖖㯬䏬㱨䖤䠫
䡀䘌䗶䐲䆊䌷䑲
䡀䇊䌰㾱㼒䔨䈸䆱䠨
䡀䈏䗤䕸㬨䐲䒳䈱䗱䠶
䡀䑒䗶䏤㾯㼒䔨䈸䆱䠨
䡀䇊䌰㮱䈻䘦䈷䈜䘴䑨䈦
䡀䇊䗹䛎䆨䗸㼨䔨䈸䆱䠨
䡀䑒䗶䏤㮯䈻䘦䈷䈜䘴䑨䈦
SummaryInformation
tUzTEVdtKvexSnfvCDGu
LjxucWCVzMhNfCEEQks
y5HyK1u9bWw5XV
BQBeN2HZAf4OhpkXLUH
cmaddfenqmHzL7SASZ3X
oAXwuvJs0G9Yq0
BfAZLcj6cmu
fcQ7QFjth6YEfSFH7G
oFdLFrDuC
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
URLs in VB Code - #1

file:///

1e6126e2a7e041ff1c1fa4178ea0119e > Root Entry > 䄦㡥䆾䅤 > bkaKTFW5

PE Layout

MemoryMapped (process dump suspected)

1e6126e2a7e041ff1c1fa4178ea0119e > Root Entry > 䄦㡥䆾䅤 > oFdLFrDuC

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙