Suspect
be8b24275750a9436487feca66a49566
PE Executable | MD5: be8b24275750a9436487feca66a49566 | Size: 715.26 KB | application/x-dosexec
PE Executable
MD5: be8b24275750a9436487feca66a49566
Size: 715.26 KB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Medium
|
Hash | Hash Value |
|---|---|
| MD5 | be8b24275750a9436487feca66a49566
|
| Sha1 | e8e35f6e7d9ef12816f4a92f9e8a59d2dfe45a2e
|
| Sha256 | 2313ed5be56a795a08a65c3001730df4e9c60365a484904755029bb69f953dd0
|
| Sha384 | 7751df28cb7d6fecac1294f7006189b72e07e4fe9d3a1ca533838ab6593af8acc9e6c9281dec16e254249df0e8d2da7b
|
| Sha512 | 597d7f83224d1a81addbfb1c7a02994db0b55114089c20ce30aa19702ccab715ff44cfa4cf49636e7c145023414fa4eee9ac620efe5fe0ec82dfa0f2530e1929
|
| SSDeep | 12288:bSs4YvV75RhZheKxUn3nCJZn/CMTC6RIdqRPx+0a/UWHhRJPO9nR0QYtYO7xKqXV:bSVIhnA3nWnpHzRx+0aMWHZOQQml1
|
| TLSH | 12E402582711EB03D961ABF928B0E27413BE2DAE6810D31A5EDE6DEF7867F011C44793
|
File Structure
be8b24275750a9436487feca66a49566
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
UnitConvert.BidirectionalConverterForm.resources
UnitConvert.Properties.Resources.resources
aGYk
[NBF]root.Data
[NBF]root.Data-preview.png
de
[NBF]root.Data
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | PDB Path: TEOA.pdb |
| Module Name | TEOA.exe |
| Full Name | TEOA.exe |
| EntryPoint | System.Void UnitConvert.Program::Main() |
| Scope Name | TEOA.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | TEOA |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.0 |
| Total Strings | 387 |
| Main Method | System.Void UnitConvert.Program::Main() |
| Main IL Instruction Count | 10 |
| Main IL | nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void UnitConvert.MainMenuForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null> |
be8b24275750a9436487feca66a49566 (715.26 KB)
File Structure
be8b24275750a9436487feca66a49566
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
UnitConvert.BidirectionalConverterForm.resources
UnitConvert.Properties.Resources.resources
aGYk
[NBF]root.Data
[NBF]root.Data-preview.png
de
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.