Suspicious
Suspect

a4af1b44f371e53cd243eca483f3111b

PE Executable
|
MD5: a4af1b44f371e53cd243eca483f3111b
|
Size: 11.96 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
a4af1b44f371e53cd243eca483f3111b
Sha1
dccf8ffe112865253fd752672a2626bb34c96aae
Sha256
68d99f454aa359732aeab903997391820fc0245c126d86ec6117c7d444e2ae16
Sha384
1475868ec38f9a477839a806f6eef5bf9b6c5d9dae36907d1882dbcca91a2220786efb50a5807b2cd1388143e49e7a2f
Sha512
24a5cd4adf15e1206549bb44aec8140c75596edb34b6c8d9e52b56c504f034f3e678202ee77178fae0f0438d08d810a2412d44962651bd6f9115c6b96859efbc
SSDeep
196608:wDTEq55J2U61tNKjpY2mg53cLEF3d3nafyDIfKoI3xosyQXzjIAvB3LDeiXs:Enl2U61PK1Y2zb3aH1mjjIApPeiXs
TLSH
52C63371CB8B4296DDBF4138CC3A111AF71DD6D5C16E3F9C76D0D6ABA2068E90B8D602

PeID

Microsoft Visual C++ v6.0 DLL
Nullsoft PiMP Stub -> SFX
UPolyX 0.3 -> delikon
File Structure
[NSIS Installer] @ #0001DA08
[SETUP_DECOMPILED.NSI]
Overlay_060d302a.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_060d302a.bin (11835855 bytes)

a4af1b44f371e53cd243eca483f3111b (11.96 MB)
File Structure
[NSIS Installer] @ #0001DA08
[SETUP_DECOMPILED.NSI]
Overlay_060d302a.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙