Suspicious
Suspect

1fa4e9131a13ac94778caf99d7c232ab

PE Executable
|
MD5: 1fa4e9131a13ac94778caf99d7c232ab
|
Size: 3.92 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
1fa4e9131a13ac94778caf99d7c232ab
Sha1
e9464430fa4bf29b141f39a033224d8748c0a9da
Sha256
9e1d71f44a78776c7ad49f9491f24e2afc3940b905a9b6598c3c4d187bb952c6
Sha384
030c1b590b8639449d2b3c07cdb8c04cb9417c488c8c38e99a7f808c94684f013518db1a06778cb1edddfe1a70189c80
Sha512
6d461c6260b3094980b4b25cc3ae2eeaab5a90a2af8df66c9dc7b0aab4f955cfd41c83a0a18c733adda1adf93984c9526d94d1f798d8d31b2948a9b38c7a7490
SSDeep
49152:GyK5cMyoFN6o8vuM9dflj+RbHf6jILgn+OwBzpuWOgYBgmc5i+M2cWgXRt90:GyoFidDdNgmsJbIWOnc5i+3cWgXRw
TLSH
76062220D94F119CCA982EBCE2C46735F5FF6CB09964640FB88D7D0F5E3524ABB4462A

PeID

RPolyCryptor V1.4.2 -> Vaska
x64 Themida / Winlicense v3.0.x.0 PACKED sign ASL
File Structure
[Authenticode]_66d11284.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rsrc
.idata
.tls
.themida
.boot
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0008
ID:0
ID:0009
ID:0
RT_GROUP_CURSOR4
ID:0000
ID:0
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x3BA210 size 11312 bytes

1fa4e9131a13ac94778caf99d7c232ab (3.92 MB)
File Structure
[Authenticode]_66d11284.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rsrc
.idata
.tls
.themida
.boot
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0008
ID:0
ID:0009
ID:0
RT_GROUP_CURSOR4
ID:0000
ID:0
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙