Malicious
Malicious

4b9cc7d84e87fa8fbcb3115c765ce361

AutoIt Compiled Script
|
MD5: 4b9cc7d84e87fa8fbcb3115c765ce361
|
Size: 1.09 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
4b9cc7d84e87fa8fbcb3115c765ce361
Sha1
487b40d11907c7fbf6f6595a87f7f301cf9c9f53
Sha256
e7e637ddff53d65c5d1645cc6c3ee595319948e7db913fc283a7da7b5b21a626
Sha384
e3e090b8c360196df544cba62b2207e81731cec3b27a878d6932f320afbf586c893beb838ece20f3b0935bb9f6c48d4a
Sha512
bc16264b9172c7a5980ab1736a2b904c8210d2991cfeeb31f55d613879229a4319e23e76b970b3d456fa0d1027a714a3b6a7664979e3b2e7f82ebcf29134bb65
SSDeep
24576:45EmXFtKaL4/oFe5T9yyXYfP1ijXdagsmLxDjnq:4PVt/LZeJbInQRag9
TLSH
8D35AE027391D062FFAB92334B5AF6115BBC79260123E62F13981D79BD701B1563E7A3

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
autC6F0.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: t$di

4b9cc7d84e87fa8fbcb3115c765ce361 (1.09 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙