Malicious
Malicious

1e77d47f84666a26258a2c167491abba

AutoIt Compiled Script
|
MD5: 1e77d47f84666a26258a2c167491abba
|
Size: 1.13 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
1e77d47f84666a26258a2c167491abba
Sha1
ac0944ab4e6fb9bbef5f2cda8a75cfe8a51bcf38
Sha256
b7b687f5e5499f08674126beb6511ce782aa227a9818577ef347f7142849d345
Sha384
42fb1b59494806d8bf26bfff898db3e0cfa67c89d2f2351b7815011f28ab031d83ffe2a109e1a839b79a601d30181273
Sha512
6864c4c2c56cc50d64f1ff990614d9ab28ee6264ddbe78f443495d7a0fee9fc5ad2f944be6bf717118c4bb0336834ee6f0085f97811a29f0082211201cb1cc40
SSDeep
24576:w5EmXFtKaL4/oFe5T9yyXYfP1ijXdan0pTBugr:wPVt/LZeJbInQRanIw
TLSH
B635AE027391C066FFAB92334F5AF6115BBC79260123A61F13981DB9BE701B1563E7A3

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
UPolyX 0.3 -> delikon
VC8 -> Microsoft Corporation
File Structure
autE089.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: t$di

1e77d47f84666a26258a2c167491abba (1.13 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙