Suspicious
Suspect

4c9f59825b76fd2eeee5fbac078166ca

PE Executable
|
MD5: 4c9f59825b76fd2eeee5fbac078166ca
|
Size: 3.59 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
4c9f59825b76fd2eeee5fbac078166ca
Sha1
807aceaab51dd2813f709e5ad1f3925d92083441
Sha256
87b1af25dd3bb477813d777d8f25732fd55398b8a98b6561368efbfe2fed59e5
Sha384
e55bd4ced01690e4fc7fefddebb29f9942059f9d62b63d9fd108536de07e30cb6e0c3dd6bdc5b4d1dcf64836d8d9725c
Sha512
84da726129f794dcf006218e7372b92dcfb313c15f28615837f7d777d842498d9ae370f82fe0999e2c0cb4292ee205fdee3f4bac903fe8df9387fa0acd25b740
SSDeep
98304:INkFmcmipT1ZmZPovTFRq7VO+Dba3xSzH:hmcDZmZAvTFRU8Wb64z
TLSH
B6F53326EDF4D079FC2C06B4180A8DA496326D011D34A71E7A2CD7E607E7B4916EF36E

PeID

Borland Delphi 4.0
Inno Setup Module [SFX] - v.5.x - 6.0 Borland Delphi - ASL
Microsoft Visual C++ v6.0 DLL
UPolyX 0.3 -> delikon
File Structure
4c9f59825b76fd2eeee5fbac078166ca
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
CODE
DATA
BSS
.idata
.tls
.rdata
.reloc
.rsrc
Resources
RT_ICON
ID:0001
ID:1043
ID:0002
ID:1043
ID:0003
ID:1043
ID:0004
ID:1043
RT_STRING
ID:0FF9
ID:0
ID:0FFA
ID:0
ID:0FFB
ID:0
ID:0FFD
ID:0
ID:0FFE
ID:0
ID:0FFF
ID:0
RT_RCDATA
ID:2B67
ID:0
RT_GROUP_CURSOR4
ID:0000
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
4c9f59825b76fd2eeee5fbac078166ca (3.59 MB)
File Structure
4c9f59825b76fd2eeee5fbac078166ca
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
CODE
DATA
BSS
.idata
.tls
.rdata
.reloc
.rsrc
Resources
RT_ICON
ID:0001
ID:1043
ID:0002
ID:1043
ID:0003
ID:1043
ID:0004
ID:1043
RT_STRING
ID:0FF9
ID:0
ID:0FFA
ID:0
ID:0FFB
ID:0
ID:0FFD
ID:0
ID:0FFE
ID:0
ID:0FFF
ID:0
RT_RCDATA
ID:2B67
ID:0
RT_GROUP_CURSOR4
ID:0000
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙