General
Structural Analysis
Config.0
Yara Rules94
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
|
Hash | Hash Value |
|---|---|
| MD5 | 277050abba0946b9ed9f57879a0d6ca7
|
| Sha1 | bf6677afc96cb84e836a4ac138aaf319e69efb29
|
| Sha256 | 48faed87423764726e02f5428e32a0e1f735fa4ff3e484823f51d5775b463084
|
| Sha384 | 95a87736442e3e29a779550a06e1aff5c0a9ccc5c02baeae055a0397160134d97ac8b2cd20f0c2397ff00c607d36ac46
|
| Sha512 | 6583a3668711a99a279023aac9f532542dc89bd40c0a343413844655e40cf91e10d72117b8f71d436e3911295a62e307c39b189f68d501dabad46aa42d1e9ee8
|
| SSDeep | 49152:IBJjYINUGVdbjjiTolpbmxftqaL4RwaE4X7yj5vD:yxfUGnjuol5mxftf94XOj5L
|
| TLSH | 32A5BF166AD24E37C2601A318457143D92A5D77A2A72EF0B371F10E5AC03BB9CF762B7
|
PeID
Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
277050abba0946b9ed9f57879a0d6ca7
Malicious
Overlay_1583c56a.bin
Malicious
portInto.exe
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
7VcQPPhULC7ojM5amr.YP5Tqrgg2adnqqPkna
FDKKsw2mCbqUXiY74d.9gLsYIyXfvKX3oiySR
qpV8NKrACy2t1ViILR.dr5nFxdfaQghWI1UyO
m2qvN34C3DxbGdbFyr.KVLpQ27kWNKwjVetSi
BBwKSUktnylfdEDmjb.3Wio4fJlpWojjxfhVp
sfFo8JX6jx81iagNlJ.x6xHqXM4qXc08hxos2
Eokr18q9vlgVDpAAs3hUaM8p.bat
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
RT_MANIFEST
ID:0001
ID:1033
277050abba0946b9ed9f57879a0d6ca7.decoded.vbs
Malicious
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | Overlay extracted: Overlay_1583c56a.bin (1918669 bytes) |
| Info | PDB Path: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
277050abba0946b9ed9f57879a0d6ca7 (2.24 MB)
File Structure
277050abba0946b9ed9f57879a0d6ca7
Malicious
Overlay_1583c56a.bin
Malicious
portInto.exe
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
7VcQPPhULC7ojM5amr.YP5Tqrgg2adnqqPkna
FDKKsw2mCbqUXiY74d.9gLsYIyXfvKX3oiySR
qpV8NKrACy2t1ViILR.dr5nFxdfaQghWI1UyO
m2qvN34C3DxbGdbFyr.KVLpQ27kWNKwjVetSi
BBwKSUktnylfdEDmjb.3Wio4fJlpWojjxfhVp
sfFo8JX6jx81iagNlJ.x6xHqXM4qXc08hxos2
Eokr18q9vlgVDpAAs3hUaM8p.bat
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
RT_MANIFEST
ID:0001
ID:1033
277050abba0946b9ed9f57879a0d6ca7.decoded.vbs
Malicious
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.