Suspicious
Suspect

260068f3eb51470c3dd396b239441123

PE Executable
|
MD5: 260068f3eb51470c3dd396b239441123
|
Size: 1.96 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
260068f3eb51470c3dd396b239441123
Sha1
f5242df0cd89d1e7e93809b3f57119f1f02fddcf
Sha256
e8fc5780d9cc4a19331190c876fbee0bc456a9f4b4b7610c6054474f18d2744f
Sha384
4dd027ea0c57b050f7d6d0dc415a904e7630ff0f580fb86ddc0fb06b7a455546749bb9b07b4979038a0dd63fe848b326
Sha512
9cecadd351b4c3c994801ee565a2a284280654b4623d1328d6ceadefebe056d86c4a1dda12ea04ae24b85d6ed383c9e5409cacfe615e8f40970d176d5f4867b4
SSDeep
49152:wudsKK64Eec20eCdWbivNY/Ml2chdQJs+krdUVeWqDGpRwIN:wuKu4EexCAGe0RnQGLrCV2nIN
TLSH
429523415183617FC9B1C27BD19B77B8E8A03FBB8D914C4AE2493E146C379D29E2B60D

PeID

Microsoft Visual C++ v6.0 DLL
UPolyX 0.3 -> delikon
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
s0
lt0
lt1
lt2
.reloc
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
RT_GROUP_CURSOR4
ID:0000
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

260068f3eb51470c3dd396b239441123 (1.96 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
s0
lt0
lt1
lt2
.reloc
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
RT_GROUP_CURSOR4
ID:0000
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙