Malicious
Malicious

1ea188346101b757259c39e80a6590fa

PE Executable
|
MD5: 1ea188346101b757259c39e80a6590fa
|
Size: 3.09 MB
|
application/x-dosexec


Print
General
Structural Analysis
Config.0
Yara Rules99+
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
1ea188346101b757259c39e80a6590fa
Sha1
4bf536a290963e299ce6b699e63a2d10781fb154
Sha256
bee6b54ab1e1302a7c9e48d41fb233e3d6f2ab0c421254eedb19a0101cf3b1fc
Sha384
d55f91ae671ffc14321a1108fc7b98ddf3fe6297f9c7d09c488c0afde64588e32f61c25ce5ce7649915e3e6d85e9afc9
Sha512
eabbb99eeb14f272b3522d9c4cd354f7a142b5b3689efa8c9b48d0c5d0e97c23c03415afd73fbc22efcc755d3e3c410edc667ec8ca42de3fd8bfb5784ce001de
SSDeep
49152:oYT17pq/X+p1y+kGd7mpHg0KB4O8b8ITDnl1ZkaE:zTtpZjy+77OS
TLSH
BCE5E61266C8C1EBD1652170CC59BBF940646C78CB628DF7BE447E16BA307D29933A3E

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8.0 (DLL)
Microsoft Visual C++ v6.0 DLL
Private EXE Protector V2.30-V2.3X -> SetiSoft Team
File Structure
[Authenticode]_0b00b3f4.p7b
Overlay_b04071df.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0079
ID:1033
ID:1033-preview.png
ID:007A
ID:1033
ID:1033-preview.png
TYPELIB
ID:0001
ID:16393
RT_BITMAP
ID:0074
ID:16393
ID:0075
ID:16393
ID:0076
ID:16393
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
RT_DIALOG
ID:0065
ID:1033
ID:0067
ID:1033
ID:0068
ID:1033
ID:0069
ID:1033
ID:006A
ID:1033
ID:006B
ID:1033
ID:006C
ID:1033
ID:006D
ID:1033
ID:0071
ID:1033
ID:0078
ID:1033
ID:007D
ID:1033
RT_STRING
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0008
ID:1033
ID:0041
ID:1033
ID:0042
ID:1033
RT_RCDATA
ID:0000
ID:1033
RT_MESSAGETABLE
ID:0001
ID:1033
RT_GROUP_CURSOR4
ID:0001
ID:1033
ID:0002
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
RT_DLGINIT
ID:0071
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader FAIL, AsmResolver Mapped OK

Info

Overlay extracted: Overlay_c95a7c1b.bin (2706680 bytes)

Info

Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_3857cba8.exe

Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

PE Layout

MemoryMapped (process dump suspected)

1ea188346101b757259c39e80a6590fa (3.09 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙