Suspicious
Suspect

2ea65b1f5ab50d8a7f0b51cc4d46921a

PE Executable
|
MD5: 2ea65b1f5ab50d8a7f0b51cc4d46921a
|
Size: 717.31 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
2ea65b1f5ab50d8a7f0b51cc4d46921a
Sha1
0443282930b48a441ebe8a2b1fe8a76bbe41708d
Sha256
18bdc6654a91219d11b56059df0aa5bdce67e8db3faade250c5d40dba9cf0e9b
Sha384
60daf188c72c2a2c30f808f741af1e00225c572cb3bcf5a67f7c5cf69675d2a9d09cefb677e10a70020c0b6ae1b2b48c
Sha512
983ff29bf764c22620767b60a52eb2f59a4cbb34c5b5c703f3992b7ec8090fea92c2d490bf5eda98dec3f945f1351642d0ce764d93995e21221657afb9c4caa3
SSDeep
12288:zZNf+Zg31QqX0K8gCJ2pnEsZUGCQiDiLV8r4E14G/HMkV1ongR64bhbvZUMLExPb:zb/QPKL3BKGCQC6IHLV364hveMAP3IHU
TLSH
ABE4124EB723E991C31C1F7A96932A0852B64427E662F26F4EDA2CF2CE35754C04F647

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

meKX.exe

Full Name

meKX.exe

EntryPoint

System.Void CustomEventLogCreator.Program::Main()

Scope Name

meKX.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

meKX

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void CustomEventLogCreator.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Byte[] CustomEventLogCreator.Classes.CustomLogger::Ⴐ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void CustomEventLogCreator.Classes.EventLogCreator::Ⴄ() ldc.i4.s 93 ldc.i4.s 122 call System.Void CustomEventLogCreator.Classes.EventLogCreator::Ⴜ(System.Int32,System.Int16) ldc.i4.0 <null> ldc.i4 517 ldc.i4 618 call System.Void CustomEventLogCreator.Properties.Resources::Ⴓ(System.Boolean,System.Char,System.Int16) ldloc.2 <null> ldc.i4.s 79 ldelem.u1 <null> ldc.i4.s 35 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void CustomEventLogCreator.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void CustomEventLogCreator.Program::Main() pop <null> ret <null>

Module Name

meKX.exe

Full Name

meKX.exe

EntryPoint

System.Void CustomEventLogCreator.Program::Main()

Scope Name

meKX.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

meKX

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void CustomEventLogCreator.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Byte[] CustomEventLogCreator.Classes.CustomLogger::Ⴐ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void CustomEventLogCreator.Classes.EventLogCreator::Ⴄ() ldc.i4.s 93 ldc.i4.s 122 call System.Void CustomEventLogCreator.Classes.EventLogCreator::Ⴜ(System.Int32,System.Int16) ldc.i4.0 <null> ldc.i4 517 ldc.i4 618 call System.Void CustomEventLogCreator.Properties.Resources::Ⴓ(System.Boolean,System.Char,System.Int16) ldloc.2 <null> ldc.i4.s 79 ldelem.u1 <null> ldc.i4.s 35 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void CustomEventLogCreator.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void CustomEventLogCreator.Program::Main() pop <null> ret <null>

2ea65b1f5ab50d8a7f0b51cc4d46921a (717.31 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙