Malicious
Malicious

46e8a2cc132c199f1ffeb95623be6e73

AutoIt Compiled Script
|
MD5: 46e8a2cc132c199f1ffeb95623be6e73
|
Size: 1.18 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
46e8a2cc132c199f1ffeb95623be6e73
Sha1
8403324938e2f99817d79fd669db55e6403a3ea0
Sha256
faf7837d6f3eab407b7555232f4e8a779e8f2ecc49a72a46354dd802b2479bdf
Sha384
cb7b3cdbfdc5c526d848d9ad61fdddbaceec710f00c0f3856689a13c9d23c342dc80c8033fe3d1f64c7e38bee636d922
Sha512
6ad5b1af37efe7023a1b8f62c50299f2b5d4c6979ab99cc15634830472a28aa99ac6fe7a31eb758bbdd59b175042f99b69bf682050be67fcc78c49e145416f39
SSDeep
24576:A5EmXFtKaL4/oFe5T9yyXYfP1MAXDzVf8tZ7qOZMGJu:APVt/LZeJbInGizVkD7dMG
TLSH
2D45AE027381D062FFAB91734F5AF6115BBC79260123A62F13981DB9BE701B1563E7A3

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut2D67.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

46e8a2cc132c199f1ffeb95623be6e73 (1.18 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙