General
Structural Analysis
Config.1
Yara Rules49
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
Symbol Obfuscation Score
Low
|
Hash | Hash Value |
|---|---|
| MD5 | ba69008a5c5e0096d3765ec7471ea066
|
| Sha1 | bafe2763b84644cbafcb974f72cbc57e44ce2af4
|
| Sha256 | 3e8d997c6e26dcd0aad2ba74c99b5b46fbee0db1d0d46088ae5c8155fb827c33
|
| Sha384 | 815abc8e242971f547af1386a25f300df2a5f92993842a1a0bac892aecc6b453ea76896da796200efe300abe9c6a904f
|
| Sha512 | 7f1da3a6fe66cf1d03386b81be5796b8ca11e1b27a20154b10a86d62e73f3b348ea9ddaddde1fb83cccb5855f2719e618c0bcb9bdc37e871c5eebb6503c784ec
|
| SSDeep | 1536:1qsklqWWlbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed2HteulgS6pg:zEReY/+zi0ZbYe1g0ujyzdLg
|
| TLSH | C2A35D2067AC9F19EAFD1B74B4B2012043F1E08A9091FB4B4DC164E61FA7B865957FF2
|
PeID
.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
ba69008a5c5e0096d3765ec7471ea066
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - RedLine Config.
|
Config. Field0 | Value |
|---|---|
| [Configuration Module Name] | EntryPoint |
| [Configuration Module Full Name] | EntryPoint |
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Module Name | Happy.exe |
| Full Name | Happy.exe |
| EntryPoint | System.Void Program::Main(System.String[]) |
| Scope Name | Happy.exe |
| Scope Type | ModuleDef |
| Kind | Console |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Happy |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.0 |
| Total Strings | 234 |
| Main Method | System.Void Program::Main(System.String[]) |
| Main IL Instruction Count | 3 |
| Main IL | newobj System.Void EntryPoint::.ctor() call System.Void Program::Execute(EntryPoint) ret <null> |
| Module Name | Happy.exe |
| Full Name | Happy.exe |
| EntryPoint | System.Void Program::Main(System.String[]) |
| Scope Name | Happy.exe |
| Scope Type | ModuleDef |
| Kind | Console |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Happy |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.0 |
| Total Strings | 234 |
| Main Method | System.Void Program::Main(System.String[]) |
| Main IL Instruction Count | 3 |
| Main IL | newobj System.Void EntryPoint::.ctor() call System.Void Program::Execute(EntryPoint) ret <null> |
ba69008a5c5e0096d3765ec7471ea066 (97.79 KB)
File Structure
ba69008a5c5e0096d3765ec7471ea066
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - RedLine Config.
|
Config. Field0 | Value |
|---|---|
| [Configuration Module Name] | EntryPoint |
| [Configuration Module Full Name] | EntryPoint |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.