General
Structural Analysis
Config.0
Yara Rules10
Sync
Community
Summary by MalvaGPT
Characteristics
Symbol Obfuscation Score
Medium
|
Hash | Hash Value |
|---|---|
| MD5 | c5b06db08c6a09e62a3c537c3a61851c
|
| Sha1 | 96fb2cbec7c08192a9b303e2d67be2f3fc9de36e
|
| Sha256 | 8d1523bbaf9cccd544215c1dec33d97aa6cd4273dc4bb6469823c1385626d233
|
| Sha384 | edad1f40cf1421dcadc8729fa30807920df0f6b8218da8ca58a6c082368bf219a5a61cf8e23770d606e2d79fe4c9d622
|
| Sha512 | 9ac02c19a31c84dbc861489402f1db518459d526ca51256ba523ef15cb09f73325fafc34e34149bbf0e23678e05792113cbde04dcd5f0382634398f8b814ae9b
|
| SSDeep | 6144:myqpUEbKB7nSOhDu9oR1yEKXrnu2xxmAXyJR4iO6GELMJsujstDWfRjTfQtbz:eUEbItuO3hwxxmACJR4+GapAfRjT0
|
| TLSH | DEA40100B8C060B3CE47A63470939E41EEB67D9D1B715B4F5E9D4EAE9F3329416ACE24
|
PeID
Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ DLL
Microsoft Visual C++ v6.0
Microsoft Visual C++ v6.0 DLL
File Structure
c5b06db08c6a09e62a3c537c3a61851c
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
nsaknr.Resources
Runtime Broker.exe
.exe
.exe
+!$%#
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.reloc
+!$#%
MeoxD^!
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Module Name | update.exe |
| Full Name | update.exe |
| EntryPoint | System.Void Program::Main() |
| Scope Name | update.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | update |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 58 |
| Main Method | System.Void Program::Main() |
| Main IL Instruction Count | 7 |
| Main IL | ldc.i4.0 <null> newarr System.Object ldstr ؗ؛ؒؗؔؗ؛ؚؒؗؗ؛ؒؗ؛؛ؗ؈ؗؒؗ؛ؘؒؗؗ؛ؒؗؗ؛ؒؗؕ ldstr ؖ؏؆ؖؔ؎ call System.Object ConversionBack.wMeow::Meoww(System.Object[],System.String,System.String) stloc.s V_8 ret <null> |
c5b06db08c6a09e62a3c537c3a61851c (489.98 KB)
File Structure
c5b06db08c6a09e62a3c537c3a61851c
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
nsaknr.Resources
Runtime Broker.exe
.exe
.exe
+!$%#
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.reloc
+!$#%
MeoxD^!
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.