Malicious
Malicious

ab4022da25c6eb474fbdec7873cb47db

AutoIt Compiled Script
|
MD5: ab4022da25c6eb474fbdec7873cb47db
|
Size: 1.13 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
ab4022da25c6eb474fbdec7873cb47db
Sha1
fdbebac6609757cb85d2d5d5e6924eaf918c4fae
Sha256
3d0f1a9746951410f48c38416b0951504cb674555be372a40fb257cd892d4580
Sha384
49a02b9e3532931e7f6afc61d3ea124c521ef59e255093fd07ead67a2d8e24fa604152e54e39e113eec98efc43b5de35
Sha512
a08a92e69e23fdf745dea1db32bf18191e41b1e4dffb2dd0c61e305f4fff357aa665ba20fa3b89ab0257c51cb68f2c00d201b0172ee40e3b1524bc0c184a8333
SSDeep
24576:m5EmXFtKaL4/oFe5T9yyXYfP1ijXdaOUy+IG7s7Xr:mPVt/LZeJbInQRaOmzs
TLSH
5E35AE027391D062FFAB91334B5AF6115BBC79260123E62F13981D7ABE701B1563E7A3

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut880.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: t$di

ab4022da25c6eb474fbdec7873cb47db (1.13 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙