Suspect
a304a52b2b8bd40ca0915170f45ffa59
PE Executable | MD5: a304a52b2b8bd40ca0915170f45ffa59 | Size: 3.84 MB | application/x-dosexec
PE Executable
MD5: a304a52b2b8bd40ca0915170f45ffa59
Size: 3.84 MB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Low
|
Hash | Hash Value |
|---|---|
| MD5 | a304a52b2b8bd40ca0915170f45ffa59
|
| Sha1 | 6e416ee741c6fc85bb73b586295fc72b84aa8339
|
| Sha256 | ed943a94a73e12300c6fe833b553cddd1cefda33fd849300447e33d33c0758c7
|
| Sha384 | 76ba4a40e1b2a639728bb9d8fe802e80a2c01e9fd789f9243a40676ee91eca05a51ee5cb19974e1742bf894d715498cc
|
| Sha512 | 4f21af5254dc12c7c37da109f59c3ef79984e342199c5c842ca35d36e42474fa305aaa02cd7744f74919b651ca36bc051365eb623151f98fc458f4bd4e6fc2c4
|
| SSDeep | 98304:0TIDL4ibHDNjIxONnj2osOwx+xAdSOEKpxhcWO/u:0knLtqONnaQRABXQ/u
|
| TLSH | 190623CC365071AFC457D4B1CDA95D68AAA07CBA83072257A41379AEAE3DC8BCF144F1
|
PeID
Microsoft Visual C# / Basic .NET
Microsoft Visual C++ v6.0 DLL
UPolyX 0.3 -> delikon
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
44V1pa
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
|
Name0 | Value |
|---|---|
| Module Name | server1.exe |
| Full Name | server1.exe |
| EntryPoint | System.Int32 <Module>::(System.String[]) |
| Scope Name | server1.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | server1 |
| Assembly Version | 5.5.5.8 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.8 |
| Total Strings | 0 |
| Main Method | System.Int32 <Module>::(System.String[]) |
| Main IL Instruction Count | 0 |
| Main IL | |
| Module Name | server1.exe |
| Full Name | server1.exe |
| EntryPoint | System.Int32 <Module>::(System.String[]) |
| Scope Name | server1.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | server1 |
| Assembly Version | 5.5.5.8 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.8 |
| Total Strings | 0 |
| Main Method | System.Int32 <Module>::(System.String[]) |
| Main IL Instruction Count | 0 |
| Main IL | |
Artefacts
|
Name0 | Value |
|---|---|
| Embedded Resources | 1 |
| Suspicious Type Names (1-2 chars) | 0 |
a304a52b2b8bd40ca0915170f45ffa59 (3.84 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
44V1pa
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
Artefacts
|
Name0 | Value | Location |
|---|---|---|
| Embedded Resources | 1 |
a304a52b2b8bd40ca0915170f45ffa59 |
| Suspicious Type Names (1-2 chars) | 0 |
a304a52b2b8bd40ca0915170f45ffa59 |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.