Suspicious
Suspect

7fe85f30f1a34f25ea2514176117cb5b

PE Executable
|
MD5: 7fe85f30f1a34f25ea2514176117cb5b
|
Size: 3.85 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
7fe85f30f1a34f25ea2514176117cb5b
Sha1
fe3ba552351511144dac8adb1d8da3f1b3fe4184
Sha256
c5731cdbb8604adea26e561124d3feb93d600d6062357a7fd3231478a370390d
Sha384
72da7edf7e4b958cb45fbe8eeb36d03f91c188d4060b2bd73ce5a466ceef83eaeeed0acfd4fefce87f576df192bd7a9f
Sha512
edd7415966489f60a31b2efbe4a65c30474dd0ccdd4ccdaed3a6ea9c7c4c2f16a14c15cf83b325ff4ee9c665b42b8393b91e9cf454a2f19e0c6a611db98b978d
SSDeep
98304:S5Wr+pdhvAyKbxueeF7rajt6i4s/LotwNR5bT1/m55JcOofxy7sj83Pk0l:4WCtARFO7ti4mk2Nbb5/mPmOofxUsQ80
TLSH
AD0633A06A044D01D4E573B46E7AE3B35E787ED65213B30F0ADCECFFBA147982858586

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
UPolyX 0.3 -> delikon
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
CatFeeder.Properties.Resources.resources
AkIB
[NBF]root.Data
[NBF]root.Data-preview.png
cgi
[NBF]root.Data
Informations
Name
Value
Module Name

epNp.exe

Full Name

epNp.exe

EntryPoint

System.Void CatFeeder.Program::Main()

Scope Name

epNp.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

epNp

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

91

Main Method

System.Void CatFeeder.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void CatFeeder.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

epNp.exe

Full Name

epNp.exe

EntryPoint

System.Void CatFeeder.Program::Main()

Scope Name

epNp.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

epNp

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

91

Main Method

System.Void CatFeeder.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void CatFeeder.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
PDB Path

epNp.pdb

7fe85f30f1a34f25ea2514176117cb5b (3.85 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
CatFeeder.Properties.Resources.resources
AkIB
[NBF]root.Data
[NBF]root.Data-preview.png
cgi
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

epNp.pdb

7fe85f30f1a34f25ea2514176117cb5b

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙