General
Structural Analysis
Config.0
Yara Rules1
Sync
Community
Summary by MalvaGPT
Characteristics
|
Hash | Hash Value |
|---|---|
| MD5 | 601a25f8147e5a07bd65ab402f0266df
|
| Sha1 | 2186f3f5f987d37885fa7c8ed36c974a2a70e2b4
|
| Sha256 | 5c69e42ab544d80e631e61ecaaa43b40c87605a35d0c4c244d74f039422a2ea3
|
| Sha384 | ced095d54cdc04dc9217208e2062e9752c3ad8606694ab0491d626d4268c6fcc29bdeb991dd21e4768cef0d62206cd6f
|
| Sha512 | f1667f89ebb9f9503a28e2b884508ce18f2aa3643434b05ad1c1cb78b17a37c3d73e6040a4768fb75538759f1c4c3411bfe9f754d2dcde116b3c6d0a504e5ca0
|
| SSDeep | 12288:QGoWKqIely+4tzYWUMISR4j3vHWYWZ2MHkhX50QWXk6DBNkEHcMX:B8XeEJ1fUMNRu3v2YWwMHk3yk69NsE
|
| TLSH | C2D423707AC0E4ABE6560370D4B98E71EFB14D94D54F60139BA02F0BF2B1BC9461F5AA
|
PeID
Microsoft Visual C++ v6.0 DLL
File Structure
601a25f8147e5a07bd65ab402f0266df
[NSIS Installer] @ #00022008
Overlay_326a69bd.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_BITMAP
ID:006E
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
RT_DIALOG
ID:0068
ID:1033
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | Overlay extracted: Overlay_326a69bd.bin (469764 bytes) |
Artefacts
|
Name0 | Value |
|---|---|
| PE Layout | MemoryMapped (process dump suspected) |
601a25f8147e5a07bd65ab402f0266df (609.03 KB)
File Structure
601a25f8147e5a07bd65ab402f0266df
[NSIS Installer] @ #00022008
Overlay_326a69bd.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_BITMAP
ID:006E
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
RT_DIALOG
ID:0068
ID:1033
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
Artefacts
|
Name0 | Value | Location |
|---|---|---|
| PE Layout | MemoryMapped (process dump suspected) |
601a25f8147e5a07bd65ab402f0266df > [NSIS Installer] @ #00022008 > $PLUGINSDIR |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.