Malicious
Malicious

978d5547a982ce9c09a9d3447603b9cb

AutoIt Compiled Script
|
MD5: 978d5547a982ce9c09a9d3447603b9cb
|
Size: 1.13 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
978d5547a982ce9c09a9d3447603b9cb
Sha1
a408c2d00a71d38f626a24e170a66c185895830e
Sha256
b5d5f6646fc657db12f60bd146588383b1bb2f302772471cb35ecf87edf4d528
Sha384
13264a186c805acfd1e348bebd10361fba7451c123466fca84f792b6203c61d7f095ac83d2a0b9585c8a7b4af8666b89
Sha512
677e4f17d4796fa2f89a4d25313b430937775d881f958cca6842e7ada1babde47296059ae2173bb387d3ec290961612ceb1017e038b993470098a4185cc682d2
SSDeep
24576:YAHnh+eWsN3skA4RV1Hom2KXMmHaI1Ms4vrUX0o3fWiPT5:fh+ZkldoPK8YaIKs4jG0o3e6
TLSH
CB35BD02B3D2D076FFAA92739B6AF20556BC7D250133852F13982DB9BD701B1263D663

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
autF2E1.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:000D
ID:2057
ID:000E
ID:2057
ID:000F
ID:2057
ID:0010
ID:2057
ID:2057-preview.png
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:1036
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ????

978d5547a982ce9c09a9d3447603b9cb (1.13 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙