Suspicious
Suspect

a1b836d992b5746eaea029efcecb2832

PE Executable
|
MD5: a1b836d992b5746eaea029efcecb2832
|
Size: 1.04 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
a1b836d992b5746eaea029efcecb2832
Sha1
d315bc9a5127f8d20ee04592364c27900c1bd983
Sha256
c0ed3d2fbf4b6422279cf57b5278715e910ae116b4ff7e9304f7279aad206f5e
Sha384
4160f8e018f3ed851dd3bd88e81b8f1908b799b78a35cf7fa793c6dc9548ee073da999a1c3bbb454e56e489ef3f4e341
Sha512
441c917841eb4ffb428e9d58a5cb84c1c93facc44487520e330a78c2f4df817345c2216aaeaa4c97919ba9a3ed538c12dbdb96da6af82a15f17aea34219cc2e8
SSDeep
24576:pbeO5Ld/jLj1aiGe3LrxdVjxfP4NmPVvqrzZpGAIb:4GtLj1AkfVjtP5PVvqrF+
TLSH
DD25235CA72E5437D26E8A7904728328C0F7D72314B2FB5F5E0291BA79E7BC865318D2

PeID

Microsoft Visual C++ DLL
Microsoft Visual C++ v6.0
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
JaqsP
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Ulppda.exe

Full Name

Ulppda.exe

EntryPoint

System.Void  ::()

Scope Name

Ulppda.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Ulppda

Assembly Version

1.0.4743.5959

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

11

Main Method

System.Void  ::()

Main IL Instruction Count

5

Main IL

newobj System.Void e::.ctor() call System.Byte[] e::a() call System.Byte[] j::a(System.Byte[]) call System.Void q::a(System.Byte[]) ret <null>

a1b836d992b5746eaea029efcecb2832 (1.04 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
JaqsP
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙