General
Structural Analysis
Config.0
Yara Rules99+
Sync
Community
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Medium
|
Hash | Hash Value |
|---|---|
| MD5 | 78014116da0a8ce1755a13410afd8dcc
|
| Sha1 | 32ba378443b3aad8fbc4b093dca6276083dfe875
|
| Sha256 | 6e65734d1e30c9ebcc73c28147143b3a27abfecfd56246c4074a7d8d9cbf2dad
|
| Sha384 | 8a8bd5be7fe74a23ee9c56ada574238df0f0458038112a37047dd55f19714edd333021c52ccf108c56cbe3ad349f6990
|
| Sha512 | ec93f977aff1b3c24f82e63dbf9153f21d47157e669c3fd456bc3e405de75a022f89885d599bb24ab390ceeac7848614be7f67cf0701b60d275be30b88440700
|
| SSDeep | 98304:dB2pC6XG4HNkq5UKPhc24Y1/QPldHVTgPNhV0ADXqQgpkWDRIZVMnu0jjD8ueJU:ucUG4raKu24YY7HVT4hV0AD6QgqKRgX
|
| TLSH | 837633B15AC05FA9C3EE2AF42A3743091F64B45116D3B3B3B85717DDA7A882C6B4F109
|
PeID
.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
_CSVM
{FEA94A50-E5C8-4edd-BE62-F738BC8C043E}
228d1133-7bca-4fde-8ce4-9ce4139251fb
file_0.bin
7db51abf-d022-45e7-bc50-da16b93d801c
file_0.bin
Informations
|
Name0 | Value |
|---|---|
| Module Name | Fortnite hacks.exe |
| Full Name | Fortnite hacks.exe |
| EntryPoint | System.Void uhM=.uRM=::uxM=() |
| Scope Name | Fortnite hacks.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Fortnite hacks |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 29 |
| Main Method | System.Void uhM=.uRM=::uxM=() |
| Main IL Instruction Count | 1 |
| Main IL | ret <null> |
| Module Name | Fortnite hacks.exe |
| Full Name | Fortnite hacks.exe |
| EntryPoint | System.Void uhM=.uRM=::uxM=() |
| Scope Name | Fortnite hacks.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Fortnite hacks |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 29 |
| Main Method | System.Void uhM=.uRM=::uxM=() |
| Main IL Instruction Count | 1 |
| Main IL | ret <null> |
78014116da0a8ce1755a13410afd8dcc (7.39 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
_CSVM
{FEA94A50-E5C8-4edd-BE62-F738BC8C043E}
228d1133-7bca-4fde-8ce4-9ce4139251fb
file_0.bin
7db51abf-d022-45e7-bc50-da16b93d801c
file_0.bin
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.