Malicious
Malicious

78b5a4b1fc452143b346b06181b2e7a4

PE Executable
|
MD5: 78b5a4b1fc452143b346b06181b2e7a4
|
Size: 1.69 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
78b5a4b1fc452143b346b06181b2e7a4
Sha1
a46e73fba6acd24eb5610ef09d7d54228dfa8183
Sha256
80e991e05aaf94cce8bce3daf2ce8b8cb49a2b7c5e06b96d3a6281801b16b9cb
Sha384
373ed39df577e137e33bb084067837a4f9f7546fb73d71217834d70ca885ef9058d17796185ba9381b3d88e48794d604
Sha512
b87ef6b3d40df73386c2b94de8bf01f74c8e578aeb38d76fae1fcad421ba60fd314fcd0d88f5471d28b2467509be83c757bdf7265eb485e76d9fe88857e4c0b3
SSDeep
24576:j2G/nvxW3WeA8zynWGhThz1lKI6pljZixqQDICTmqk43inoRYAA5:jbA3W9nnhR+lcTmz4yoR5c
TLSH
0D758D017E44CA52F0291633C2FF465447B8AC526BA6E31B7EB977AD55223933C0DACB

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
7L03ktj6QW.bat
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
.Net Resources
T5uusuyR4cdxr99t3T.mQxWaNbY9AyTco5uTV
xBueLOIgEoGXfp6Iyn.aCR9XT35Q3Nu4pqa0p
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1024
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1024
RT_MANIFEST
ID:0001
ID:1033
78b5a4b1fc452143b346b06181b2e7a4.decoded.vbs
Malicious
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_b4a4d6ff.bin (1228886 bytes)

Info

PDB Path: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

78b5a4b1fc452143b346b06181b2e7a4 (1.69 MB)
File Structure
7L03ktj6QW.bat
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
.Net Resources
T5uusuyR4cdxr99t3T.mQxWaNbY9AyTco5uTV
xBueLOIgEoGXfp6Iyn.aCR9XT35Q3Nu4pqa0p
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1024
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1024
RT_MANIFEST
ID:0001
ID:1033
78b5a4b1fc452143b346b06181b2e7a4.decoded.vbs
Malicious
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙