Malicious
Malicious

1ea188346101b757259c39e80a6590fa

PE Executable
|
MD5: 1ea188346101b757259c39e80a6590fa
|
Size: 3.09 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
1ea188346101b757259c39e80a6590fa
Sha1
4bf536a290963e299ce6b699e63a2d10781fb154
Sha256
bee6b54ab1e1302a7c9e48d41fb233e3d6f2ab0c421254eedb19a0101cf3b1fc
Sha384
d55f91ae671ffc14321a1108fc7b98ddf3fe6297f9c7d09c488c0afde64588e32f61c25ce5ce7649915e3e6d85e9afc9
Sha512
eabbb99eeb14f272b3522d9c4cd354f7a142b5b3689efa8c9b48d0c5d0e97c23c03415afd73fbc22efcc755d3e3c410edc667ec8ca42de3fd8bfb5784ce001de
SSDeep
49152:oYT17pq/X+p1y+kGd7mpHg0KB4O8b8ITDnl1ZkaE:zTtpZjy+77OS
TLSH
BCE5E61266C8C1EBD1652170CC59BBF940646C78CB628DF7BE447E16BA307D29933A3E

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8.0 (DLL)
Microsoft Visual C++ v6.0 DLL
Private EXE Protector V2.30-V2.3X -> SetiSoft Team
File Structure
[Authenticode]_0b00b3f4.p7b
Overlay_b04071df.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0079
ID:1033
ID:1033-preview.png
ID:007A
ID:1033
ID:1033-preview.png
TYPELIB
ID:0001
ID:16393
RT_BITMAP
ID:0074
ID:16393
ID:0075
ID:16393
ID:0076
ID:16393
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
RT_DIALOG
ID:0065
ID:1033
ID:0067
ID:1033
ID:0068
ID:1033
ID:0069
ID:1033
ID:006A
ID:1033
ID:006B
ID:1033
ID:006C
ID:1033
ID:006D
ID:1033
ID:0071
ID:1033
ID:0078
ID:1033
ID:007D
ID:1033
RT_STRING
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0008
ID:1033
ID:0041
ID:1033
ID:0042
ID:1033
RT_RCDATA
ID:0000
ID:1033
RT_MESSAGETABLE
ID:0001
ID:1033
RT_GROUP_CURSOR4
ID:0001
ID:1033
ID:0002
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
RT_DLGINIT
ID:0071
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader FAIL, AsmResolver Mapped OK

Info

Overlay extracted: Overlay_c95a7c1b.bin (2706680 bytes)

Info

Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_3857cba8.exe

Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

PE Layout

MemoryMapped (process dump suspected)

1ea188346101b757259c39e80a6590fa (3.09 MB)
File Structure
[Authenticode]_0b00b3f4.p7b
Overlay_b04071df.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0079
ID:1033
ID:1033-preview.png
ID:007A
ID:1033
ID:1033-preview.png
TYPELIB
ID:0001
ID:16393
RT_BITMAP
ID:0074
ID:16393
ID:0075
ID:16393
ID:0076
ID:16393
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
RT_DIALOG
ID:0065
ID:1033
ID:0067
ID:1033
ID:0068
ID:1033
ID:0069
ID:1033
ID:006A
ID:1033
ID:006B
ID:1033
ID:006C
ID:1033
ID:006D
ID:1033
ID:0071
ID:1033
ID:0078
ID:1033
ID:007D
ID:1033
RT_STRING
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0008
ID:1033
ID:0041
ID:1033
ID:0042
ID:1033
RT_RCDATA
ID:0000
ID:1033
RT_MESSAGETABLE
ID:0001
ID:1033
RT_GROUP_CURSOR4
ID:0001
ID:1033
ID:0002
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
RT_DLGINIT
ID:0071
ID:1033
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PE Layout

MemoryMapped (process dump suspected)

1ea188346101b757259c39e80a6590fa

PE Layout

MemoryMapped (process dump suspected)

1ea188346101b757259c39e80a6590fa > [Rebuild from dump]_3857cba8.exe

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙