Suspicious
Suspect

7a9f7d161a10f2fbafc78502a91729c2

PE Executable
|
MD5: 7a9f7d161a10f2fbafc78502a91729c2
|
Size: 11.78 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
7a9f7d161a10f2fbafc78502a91729c2
Sha1
4870b7e283253dd341ccf2425201e48f90831902
Sha256
5084f193ebd2f2037931a9a4f5af28a3bd52033cf7e504b1d145717d4a83afcf
Sha384
e2367f71b6333c6fa4243936ad63a7ced3cbc4793e244031c1c9f6ab01d3760af7d68a4dea1ad75728224da24c50a79f
Sha512
cebc22ca370749fd1b00fd4807e7ca1cc7558b933c595699910a6b648ac2542665c0bfa80bf873132ecea5082b8c7bb4bd7dad9b26e525a7d609abda8264fa56
SSDeep
192:8I94kLgCATmSTq+26levHG4NY9NlhXRsasN+V/Yjf:9nBSuP6lsH9ANlhXRsasN+V/Yj
TLSH
E032A4C1DE99C722D9A106FAE42E8B106334A61657778E2FF888D31AAC1115CD7E33F5

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Aihsofmu.exe

Full Name

Aihsofmu.exe

EntryPoint

System.Void Gaurpgygyn.Gjwecz::Main()

Scope Name

Aihsofmu.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Aihsofmu

Assembly Version

1.0.6138.5472

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

5

Main Method

System.Void Gaurpgygyn.Gjwecz::Main()

Main IL Instruction Count

11

Main IL

newobj System.Void Gaurpgygyn.Tewehbrzfo::.ctor() call System.Byte[] Gaurpgygyn.Tewehbrzfo::Pnkce() stloc.0 <null> newobj System.Void Gaurpgygyn.Wncvymf::.ctor() ldloc.0 <null> call System.Byte[] Gaurpgygyn.Wncvymf::Gkyvxbxvxwb(System.Byte[]) stloc.1 <null> newobj System.Void Gaurpgygyn.Cbdtud::.ctor() ldloc.1 <null> call System.Void Gaurpgygyn.Cbdtud::Nipwyu(System.Byte[]) ret <null>

Module Name

Aihsofmu.exe

Full Name

Aihsofmu.exe

EntryPoint

System.Void Gaurpgygyn.Gjwecz::Main()

Scope Name

Aihsofmu.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Aihsofmu

Assembly Version

1.0.6138.5472

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

5

Main Method

System.Void Gaurpgygyn.Gjwecz::Main()

Main IL Instruction Count

11

Main IL

newobj System.Void Gaurpgygyn.Tewehbrzfo::.ctor() call System.Byte[] Gaurpgygyn.Tewehbrzfo::Pnkce() stloc.0 <null> newobj System.Void Gaurpgygyn.Wncvymf::.ctor() ldloc.0 <null> call System.Byte[] Gaurpgygyn.Wncvymf::Gkyvxbxvxwb(System.Byte[]) stloc.1 <null> newobj System.Void Gaurpgygyn.Cbdtud::.ctor() ldloc.1 <null> call System.Void Gaurpgygyn.Cbdtud::Nipwyu(System.Byte[]) ret <null>

7a9f7d161a10f2fbafc78502a91729c2 (11.78 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙