Suspicious
Suspect

4abe3ed8c1acd5db860261e831bdc4be

PE Executable
|
MD5: 4abe3ed8c1acd5db860261e831bdc4be
|
Size: 459.26 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
4abe3ed8c1acd5db860261e831bdc4be
Sha1
c00078fd1ff92606293d025fbb165a7d6644c5c7
Sha256
6e4854a0a4a965d1ecb59cd4e664b6c5452e00873134bb32a3ef96333738b951
Sha384
e584e54a01b85d641b08f6c8381e8eba39daacc384a4ebe3bb836e22b8eb1ef9e750f6800559763d5f2a178fe78a1779
Sha512
2d7c5244a8f9261771131d226391025cc1ed183dbc7e52fbff837778c4a530b86b35f94bdb4dde392342a39e2b644e44653a0a448461e390cb06a7a36693072a
SSDeep
6144:f/RppMst1Tl3iIwKdhXzfLuDQwgpd6rzNqAtLY+XBBYm1kdd+VXpPfZ:X9JHM9+1y4mzNq1+RBYbd+Vb
TLSH
F5A47C8746CC5D91E83CA231E7647905CBF8F585BB17D29E6FD58AEC21396233B8130A

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
kBw75jsAq.9iaSkC8i4f.resources
74d6b63d6d8f72.Resources.resources
b0aa37630
[NBF]root.Data
b0aa37631
[NBF]root.Data
b0aa37632
[NBF]root.Data
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

kBw75jsAq

Full Name

kBw75jsAq

EntryPoint

System.Void kBw75jsAq.yHg24xrZe1Kq5X::io6D2Gipd1c()

Scope Name

kBw75jsAq

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

kBw75jsAq

Assembly Version

23.5.5.142

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

548

Main Method

System.Void kBw75jsAq.yHg24xrZe1Kq5X::io6D2Gipd1c()

Main IL Instruction Count

7

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> newobj System.Void kBw75jsAq.9iaSkC8i4f::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

kBw75jsAq

Full Name

kBw75jsAq

EntryPoint

System.Void kBw75jsAq.yHg24xrZe1Kq5X::io6D2Gipd1c()

Scope Name

kBw75jsAq

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

kBw75jsAq

Assembly Version

23.5.5.142

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

548

Main Method

System.Void kBw75jsAq.yHg24xrZe1Kq5X::io6D2Gipd1c()

Main IL Instruction Count

7

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> newobj System.Void kBw75jsAq.9iaSkC8i4f::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

4abe3ed8c1acd5db860261e831bdc4be (459.26 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
kBw75jsAq.9iaSkC8i4f.resources
74d6b63d6d8f72.Resources.resources
b0aa37630
[NBF]root.Data
b0aa37631
[NBF]root.Data
b0aa37632
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙