Suspicious
Suspect

32270b4aba22553c8bc86723927499b1

PE Executable
|
MD5: 32270b4aba22553c8bc86723927499b1
|
Size: 1.25 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
32270b4aba22553c8bc86723927499b1
Sha1
a4171f2334384993f0c45723ee0ad5fd38d4a1f5
Sha256
0f62a0bd2f5e4686de5392a0025e45d5b3d222eca4380d63f40010ef671a931a
Sha384
dbd25b3e65b5d7c1596ac35a4bb3f3bae312fc37dd69834d378db4bfda59062247e388d3562b5763819cf2d39dbd010a
Sha512
6d1b1f2de051012580db0348ceb4c3c21dbf13607294bdf54915bf22dcc1475bbf12be8f83b0423b10b04cc329555346a5fccc54879c99f6c26c09708fe0ee6a
SSDeep
24576:ehvpJXeCtKURzdhE/FvxV7EuJ4y/mxcux5xXyXRLqiUbN+:e1XeCtFRxhENUAt+ty+N+
TLSH
04458B4271A5E86AC5768EF1C920D6F393712E07E614C28B0CEA7ECBF4F1F060995A57

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
ColoniaDePescadores.AreaDoPescador.resources
ColoniaDePescadores.FormProduto1.resources
$this.Icon
ColoniaDePescadores.FormProduto2.resources
ColoniaDePescadores.FormProduto3.resources
ColoniaDePescadores.FormProduto4.resources
ColoniaDePescadores.FormProduto5.resources
ColoniaDePescadores.FrmMenu.resources
ColoniaDePescadores.Login.resources
chb
statusStrip1.TrayLocation
ColoniaDePescadores.Parceiros.resources
ColoniaDePescadores.Properties.Resources.resources
ACRE
ALAGOAS
AMAPÁ
AMAZONAS
BAHIA
Banco-Itau
Banco-Votorantim
Banco-do-Brasil
Botão-limpar-limpo
DISTRITO FEDERAL
ESPÍRITO SANTO
Finanças
GOIÁS
MARANHÃO
MATO GROSSO DO SUL
PARAÍBA
PARÁ
PIAUÍ
RIO GRANDE DO SUL
RONDÔNIA
RORAIMA
SERGIPE
Sair do sistema
SÃO PAULO
TOCANTINS
TTlt
banco-do-nordeste
botão cancelar
categorias.
clients
conecte-se
conexao-na-nuvem
confirmar
excluir
eye
financa
funcionarios
instagram
interesse
liberado
lupa
novo-documento
pescador
salve-
santander-logo
security
taxaDeJuros
troca
twitter
userLogin
whatsapp
x
ColoniaDePescadores.Simulador.FormFinanciamento.resources
$this.Icon
Informations
Name
Value
Module Name

upja.exe

Full Name

upja.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

upja.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

upja

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

upja.exe

Full Name

upja.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

upja.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

upja

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
Embedded Resources

14

Suspicious Type Names (1-2 chars)

0

32270b4aba22553c8bc86723927499b1 (1.25 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
ColoniaDePescadores.AreaDoPescador.resources
ColoniaDePescadores.FormProduto1.resources
$this.Icon
ColoniaDePescadores.FormProduto2.resources
ColoniaDePescadores.FormProduto3.resources
ColoniaDePescadores.FormProduto4.resources
ColoniaDePescadores.FormProduto5.resources
ColoniaDePescadores.FrmMenu.resources
ColoniaDePescadores.Login.resources
chb
statusStrip1.TrayLocation
ColoniaDePescadores.Parceiros.resources
ColoniaDePescadores.Properties.Resources.resources
ACRE
ALAGOAS
AMAPÁ
AMAZONAS
BAHIA
Banco-Itau
Banco-Votorantim
Banco-do-Brasil
Botão-limpar-limpo
DISTRITO FEDERAL
ESPÍRITO SANTO
Finanças
GOIÁS
MARANHÃO
MATO GROSSO DO SUL
PARAÍBA
PARÁ
PIAUÍ
RIO GRANDE DO SUL
RONDÔNIA
RORAIMA
SERGIPE
Sair do sistema
SÃO PAULO
TOCANTINS
TTlt
banco-do-nordeste
botão cancelar
categorias.
clients
conecte-se
conexao-na-nuvem
confirmar
excluir
eye
financa
funcionarios
instagram
interesse
liberado
lupa
novo-documento
pescador
salve-
santander-logo
security
taxaDeJuros
troca
twitter
userLogin
whatsapp
x
ColoniaDePescadores.Simulador.FormFinanciamento.resources
$this.Icon
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

14

32270b4aba22553c8bc86723927499b1

Suspicious Type Names (1-2 chars)

0

32270b4aba22553c8bc86723927499b1

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙