Suspicious
Suspect

308a6c9a772b45c739416d7d1c2405c6

PE Executable
|
MD5: 308a6c9a772b45c739416d7d1c2405c6
|
Size: 2.11 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
308a6c9a772b45c739416d7d1c2405c6
Sha1
0f8b89508282697a7df0203171ef261333c67759
Sha256
aef25409e3448752746dfefad04b29225f2b8c6bbd2d991e3115a4069e97504e
Sha384
5e03a1bd03c95bdc86d3333a07c0a9312498039dff093d2bc75f6aa67f2bd60a36d5ac8965f2594a07c52c89360011e2
Sha512
81fcbd8b5d15aca77131fca658a6c233046857b48194fef03c61da34052791d9fd6a50df0620aaa9dffe343400558106736f64b395827c1495efefc71a619cc0
SSDeep
49152:ABRSTpc8iYM5pF9UBB6jdLXsuuX4/cqZIiQx6lSONx:aUTFM5pXUBB6BLXTuoEXx6lSONx
TLSH
0DA52342F8C485F3C4511C331B65A7616A7DBE202F268EDBB3856B1DE9614D0EB31AF2

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
6ItlIvLOz.bat
saked
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:25
ID:25-preview.png
ID:0066
ID:25
ID:25-preview.png
RT_ICON
ID:0001
ID:25
ID:0002
ID:25
ID:0003
ID:25
ID:0004
ID:25
ID:0005
ID:25
ID:0006
ID:25
ID:0007
ID:25
ID:25-preview.png
RT_DIALOG
ID:0000
ID:25
RT_STRING
ID:0007
ID:25
ID:0008
ID:25
ID:0009
ID:25
ID:000A
ID:25
ID:000B
ID:25
ID:000C
ID:25
ID:000D
ID:25
ID:000E
ID:25
ID:000F
ID:25
ID:0010
ID:25
RT_GROUP_CURSOR4
ID:0064
ID:25
RT_MANIFEST
ID:0001
ID:25
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_caf68194.bin (1788976 bytes)

Info

PDB Path: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

308a6c9a772b45c739416d7d1c2405c6 (2.11 MB)
File Structure
6ItlIvLOz.bat
saked
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:25
ID:25-preview.png
ID:0066
ID:25
ID:25-preview.png
RT_ICON
ID:0001
ID:25
ID:0002
ID:25
ID:0003
ID:25
ID:0004
ID:25
ID:0005
ID:25
ID:0006
ID:25
ID:0007
ID:25
ID:25-preview.png
RT_DIALOG
ID:0000
ID:25
RT_STRING
ID:0007
ID:25
ID:0008
ID:25
ID:0009
ID:25
ID:000A
ID:25
ID:000B
ID:25
ID:000C
ID:25
ID:000D
ID:25
ID:000E
ID:25
ID:000F
ID:25
ID:0010
ID:25
RT_GROUP_CURSOR4
ID:0064
ID:25
RT_MANIFEST
ID:0001
ID:25
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙