Malicious
Malicious

31f8859221c931dd738e580f2a0f75f9

AutoIt Compiled Script
|
MD5: 31f8859221c931dd738e580f2a0f75f9
|
Size: 1.17 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
31f8859221c931dd738e580f2a0f75f9
Sha1
d531cabb798757b40c17d5a0de7055ecc9ba9144
Sha256
6efb0ae4b2446e5d02b869f7e6c823c189ec8a45e9f6208a9cb3691b29924b3e
Sha384
0df380734bba45e1479b96486a40713eaed8f62867fa8960c2a7fb6e8e829ce94cb78e66cb08bb4130a5f4298008abd3
Sha512
133e383e3fb380c38b760d1d25414cdf27f5a9e724c35af12dd7b98a6727827c511ca2a8d63356b788a73ac0aee6b001f8add6a8a045ea6be37e838a986cebf5
SSDeep
24576:ttb20pkaCqT5TBWgNQ7abCanOo86wGJiwweS6A:eVg5tQ7abCVowGJi7R5
TLSH
2945CF2373DD8361C7B25273BA267701AEBF782506A1F96B2FD4093DE920162521E773

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut3F2D.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ????

31f8859221c931dd738e580f2a0f75f9 (1.17 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙