General
Structural Analysis
Config.0
Yara Rules16
Sync
Community
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Medium
|
Hash | Hash Value |
|---|---|
| MD5 | 4134d79008497defdfa5aa32a60ce24f
|
| Sha1 | 0aeb956a103d4708658be7f52ba548a892933384
|
| Sha256 | b0fc621e83aeacf44df97d5d6ab2d3657cf66cd610b0e7b74933b25a9dc6b84c
|
| Sha384 | e041a2f4783da028eda62a9e1e35bc0701123ce4d515cd6872766b64a757471d6f6de8e13989ad6114c5d6d5e631b77a
|
| Sha512 | adc6aa67365ef728c77637d7e3dc4ed506ec43507412d44923694af7773f73b5abe97a987094fe45f1fc70a26ca340b3be4f67b3474b6c51a54c8afd7a10ff54
|
| SSDeep | 12288:RWjQiJ2Qmq2ALDlhis8ACJDVLoBPI0/Hy/pBxwm0OJ6SvTjV/LwIeHqBgdXQ2szm:dimJALDTiDVL6N/O4fSvvps1k+gZzm
|
| TLSH | 93F412582B64DA13C6A287751AF0F2790B796EAAF800D3075FDCBEDF7562F205908613
|
PeID
UPolyX 0.3 -> delikon
File Structure
4134d79008497defdfa5aa32a60ce24f
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
TetrominoFiller.Forms.MainMenuForm.resources
TetrominoFiller.Properties.Resources.resources
Ban_Hammer
[NBF]root.Data
[NBF]root.Data-preview.png
Blender
[NBF]root.Data
[NBF]root.Data-preview.png
Moon
[NBF]root.Data
UPSN
[NBF]root.Data
[NBF]root.Data-preview.png
Verspielt
[NBF]root.Data
[NBF]root.Data-preview.png
Versteckt
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | Authenticode present at 0xB0E00 size 13832 bytes |
| Info | PDB Path: FGkN.pdb |
| Module Name | FGkN.exe |
| Full Name | FGkN.exe |
| EntryPoint | System.Void TetrominoFiller.Program::Main() |
| Scope Name | FGkN.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | FGkN |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 172 |
| Main Method | System.Void TetrominoFiller.Program::Main() |
| Main IL Instruction Count | 10 |
| Main IL | nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void TetrominoFiller.Forms.MainMenuForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null> |
4134d79008497defdfa5aa32a60ce24f (738.31 KB)
File Structure
4134d79008497defdfa5aa32a60ce24f
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
TetrominoFiller.Forms.MainMenuForm.resources
TetrominoFiller.Properties.Resources.resources
Ban_Hammer
[NBF]root.Data
[NBF]root.Data-preview.png
Blender
[NBF]root.Data
[NBF]root.Data-preview.png
Moon
[NBF]root.Data
UPSN
[NBF]root.Data
[NBF]root.Data-preview.png
Verspielt
[NBF]root.Data
[NBF]root.Data-preview.png
Versteckt
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.