Suspicious
Suspect

2bd3ed808e3c3821bafacc9ebc95c51d

PE Executable
|
MD5: 2bd3ed808e3c3821bafacc9ebc95c51d
|
Size: 4.24 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
2bd3ed808e3c3821bafacc9ebc95c51d
Sha1
5682a3b1dcf04945ceabc54e7c86743b41c4b179
Sha256
ddaae439820a0df5411341c2354443fdf010a3ba8640aa78706e7d0386cb1281
Sha384
f0eafae954b29e808fa57daf0f7218d3fc1de674a5f3937c27c2748b2238ada831a19e1491b30f31ab176b26bd37549c
Sha512
a1875d2803a5a476849a3ef385b549240a7dddaa624dce22325e2ba509f8e9f52c9adaaa3f1369284f130c74c9ca2dd95dff7219ef0ed389c23768966dfe07c3
SSDeep
98304:1YtPfk35y0/YVqdv1Mw4NW8rQyZPFW3hM5:1YtPfkI0sqd2fN+yZ9W
TLSH
AF1633F4F8B841D4F168BEFCEC64D7935BB2824637A1B52641E5E2B2C52A19D027C72C

PeID

Microsoft Visual C++ DLL
Microsoft Visual C++ v6.0
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
jwcalak.Resources
Client-built.exe
svchost.exe
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

loader.exe

Full Name

loader.exe

EntryPoint

System.Void Program::Main()

Scope Name

loader.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

loader

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

10

Main Method

System.Void Program::Main()

Main IL Instruction Count

10

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: ldnull call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

2bd3ed808e3c3821bafacc9ebc95c51d (4.24 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
jwcalak.Resources
Client-built.exe
svchost.exe
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙