Suspicious
Suspect

54a1f9b83c29734e6b1bff8511eedac6

PE Executable
|
MD5: 54a1f9b83c29734e6b1bff8511eedac6
|
Size: 1.31 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
54a1f9b83c29734e6b1bff8511eedac6
Sha1
64d3381cb2b227242e9f60950c429d2c3648c54c
Sha256
f49ef520f7362b8c359c61f5dfa2ca2e8131d6bfa9bd52eebc831bd830f55c60
Sha384
f60965cd4c10de1702cfaf7ed63157420ab4d4eb35f16520cc191db6d0beba42cd02573ad84dc9011d4666694940afb4
Sha512
cf3e2645ba4f80225b3525f978db1b20edf189df664bd3ee30059a7aa8378841f5846c265a2dc82836ee7d8257cd0eb7347bf5ac0c23e02ba6db2c402740b4f4
SSDeep
24576:SVDSUcQFUFTT1Jiji/0aaATiFso3Hu7LFV/ZxXkZ:S5qVJJi/A+FsiHu7rR6Z
TLSH
5F5523557750E40BC89A1F348D12FB38932A9FC03C71A1435AE4EF4B34E5FD2A920A7A

PeID

Microsoft Visual C++ v6.0 DLL
Nullsoft PiMP Stub -> SFX
File Structure
[Authenticode]_e9b528b4.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x13DA98 size 10544 bytes

54a1f9b83c29734e6b1bff8511eedac6 (1.31 MB)
File Structure
[Authenticode]_e9b528b4.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙