Malicious
Malicious

8b70fd6062da8aee2d9d63c106277bd0

PE Executable
|
MD5: 8b70fd6062da8aee2d9d63c106277bd0
|
Size: 3.02 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
8b70fd6062da8aee2d9d63c106277bd0
Sha1
66f7f3c54aa4f7c56b700c2689412686e9f5ac08
Sha256
a1f1d8797ffd930f0a16f3a1bd96b58419bb05bcd304a6e4ec2ddc14c664c83c
Sha384
629c59bbffa02c86fa62dd0330b075565380dcd82a8888f2c403e68010106586b90d49a447b33ba5b950716ad6a3bf93
Sha512
7caaac491e061dd5d8f5bc19ba29b9483295b8537039032f1e789e2cffe45932c94c0a5ec1556a6e3726bc5af121a69073c4596dd338de4ee5c6ed3812bebb31
SSDeep
24576:U2G/nvxW3Ww0tdG2E3pEGxXjePOMWVPtavH0vL6lQd+keNENq+0vmLax6:UbA30YJ3PXIzvwEOq+ZW6
TLSH
B5D55F342EEA102AF173FF7D8AE47596DA5FBAA33707585D10A1038A0723A42DDD153E

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
OrY7pVa93lo2.bat
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
oD8rQVDeSiHYiaA3ontqDyovYy7l.vbe
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
RT_MANIFEST
ID:0001
ID:1033
8b70fd6062da8aee2d9d63c106277bd0.decoded.vbs
Malicious
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_6c96a658.bin (2700410 bytes)

Info

PDB Path: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

8b70fd6062da8aee2d9d63c106277bd0 (3.02 MB)
File Structure
OrY7pVa93lo2.bat
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
oD8rQVDeSiHYiaA3ontqDyovYy7l.vbe
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
RT_MANIFEST
ID:0001
ID:1033
8b70fd6062da8aee2d9d63c106277bd0.decoded.vbs
Malicious
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙