Suspicious
Suspect

5492f7b5bd03099bfaed24aa04754ca2

PE Executable
|
MD5: 5492f7b5bd03099bfaed24aa04754ca2
|
Size: 1.05 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
5492f7b5bd03099bfaed24aa04754ca2
Sha1
9701c5674a73d14616b1e08edc82f66ca6f87709
Sha256
37cd053124973d351eba289478ef51493ca8d8e73f1b3561fec7fa5f278b4c63
Sha384
41ea128e6bd89889235f3e6746e366baaeb9b125eabef1429947733a9a059508161b714a4e411f37c1f295106afc1569
Sha512
f211565de9bd46b5fc2012c32bdd5cb865c35ccfb4cd28b4fd66d8516346e15c6fabadee8f1f2a0ba13845df13a2c167e7758bb589dcb7fb8aa41b412afd79cf
SSDeep
24576:QxdMltb6QLjTAHAs8ChbTKW6PyiLWIz+gZElg+gjhgmC7Fxzlk0M3Q:8d+MQ3ETKDhVZlNupnlk0M
TLSH
892523353146EC21D88E6BF41676C3B352BCEFDA5423E36385EDAD87B5316063AE8241

PeID

Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
CatFeeder.Properties.Resources.resources
UyZo
[NBF]root.Data
[NBF]root.Data-preview.png
cgi
[NBF]root.Data
Informations
Name
Value
Module Name

yRsw.exe

Full Name

yRsw.exe

EntryPoint

System.Void CatFeeder.Program::Main()

Scope Name

yRsw.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

yRsw

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

91

Main Method

System.Void CatFeeder.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void CatFeeder.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

yRsw.exe

Full Name

yRsw.exe

EntryPoint

System.Void CatFeeder.Program::Main()

Scope Name

yRsw.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

yRsw

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

91

Main Method

System.Void CatFeeder.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void CatFeeder.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
PDB Path

yRsw.pdb

5492f7b5bd03099bfaed24aa04754ca2 (1.05 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
CatFeeder.Properties.Resources.resources
UyZo
[NBF]root.Data
[NBF]root.Data-preview.png
cgi
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

yRsw.pdb

5492f7b5bd03099bfaed24aa04754ca2

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙