Suspicious
Suspect

87c3fd854df3caea05ed47574eef70d3

PE Executable
|
MD5: 87c3fd854df3caea05ed47574eef70d3
|
Size: 1.41 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
87c3fd854df3caea05ed47574eef70d3
Sha1
cc89001e83f05593ad303bcfaccb8d048c8f8143
Sha256
beb637ceb20275efa5ae8dc5b8be06287d7f45df6ab7454c378ff841a0f29f29
Sha384
0bc414c05d68d76e64c866d6beaf8aa9949dd00da18f06866ff0b583a5237b60e391de7bfb332188e09028fbae29b41a
Sha512
21e13b3198ca1c523cde984fee16476bcbbb476f58ecfa1317080ac3b4db89099c81a5293a88d961dffbe3e6332d7fc18ef378d296676f327d47a30d1ce665a6
SSDeep
24576:D12dcsbca6X3VtBhZXl7QcejvOrPfmYmW/VkcR/8D1PhjfRceFplQ6a:6csbYX3VtBhrMi3zV3t8DbjfRcuLQ1
TLSH
2055124DBB9AED11CA5C0E37D923600C41F3C2A7DD36F26A88D98CE51D5A394C95EE83

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x154200 size 13832 bytes

Module Name

JZaVv.exe

Full Name

JZaVv.exe

EntryPoint

System.Void BlindSimulator.Program::Main()

Scope Name

JZaVv.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

JZaVv

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void BlindSimulator.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BlindSimulator.Form2::Ⴈ() ldc.i4 302 ldc.i4 302 call System.Void BlindSimulator.Properties.Resources::Ⴈ(System.Char,System.Int16) ldc.i4.0 <null> ldc.i4 850 ldc.i4 791 call System.Void BlindSimulator.Form2::Ⴗ(System.Boolean,System.Int16,System.Int16) ldc.i4.0 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BlindSimulator.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BlindSimulator.Program::Main() pop <null> ret <null>

Module Name

JZaVv.exe

Full Name

JZaVv.exe

EntryPoint

System.Void BlindSimulator.Program::Main()

Scope Name

JZaVv.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

JZaVv

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void BlindSimulator.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BlindSimulator.Form2::Ⴈ() ldc.i4 302 ldc.i4 302 call System.Void BlindSimulator.Properties.Resources::Ⴈ(System.Char,System.Int16) ldc.i4.0 <null> ldc.i4 850 ldc.i4 791 call System.Void BlindSimulator.Form2::Ⴗ(System.Boolean,System.Int16,System.Int16) ldc.i4.0 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BlindSimulator.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BlindSimulator.Program::Main() pop <null> ret <null>

87c3fd854df3caea05ed47574eef70d3 (1.41 MB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙