Suspicious
Suspect

c7d51d2ddcfedd7234d82016f3d1944b

PE Executable
|
MD5: c7d51d2ddcfedd7234d82016f3d1944b
|
Size: 1.25 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
c7d51d2ddcfedd7234d82016f3d1944b
Sha1
b156932d3edb7377f9493d4e38168a8070578f3c
Sha256
09dcb03bd67ebe186aa8874c549c4e9c62f10fd0ae483b5bf6dc89e2003ebb71
Sha384
3c23ac02865e68cd171f20cb96b3743b419fb8df0002ffb209344243af47c73e7492cdc812302169cb5475b9a685629a
Sha512
ccf9b28b7ff33db69b61592f499be49ba6bfbd8b4721c4a934613bf0eb83e7558348c8a1ef91d70a3349f11c1b98ac2ddd6dd6360bd9ea2e1927347befb530e8
SSDeep
24576:JhZLJXeCtKYRzdhE/FvMTV+GdOIBZvQo+mp+PrZiEjaP0h8:J1XeCtxRxhEN8hjBZ1+mpwFq0h8
TLSH
06458A4272A5E86BC2768AF1CA20D6F393716E07E614C28B0CE57ECBF5F1F060991657

PeID

.NET executable
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
ColoniaDePescadores.AreaDoPescador.resources
ColoniaDePescadores.FormProduto1.resources
$this.Icon
ColoniaDePescadores.FormProduto2.resources
ColoniaDePescadores.FormProduto3.resources
ColoniaDePescadores.FormProduto4.resources
ColoniaDePescadores.FormProduto5.resources
ColoniaDePescadores.FrmMenu.resources
ColoniaDePescadores.Login.resources
chb
statusStrip1.TrayLocation
ColoniaDePescadores.Parceiros.resources
ColoniaDePescadores.Properties.Resources.resources
ACRE
ALAGOAS
AMAPÁ
AMAZONAS
BAHIA
Banco-Itau
Banco-Votorantim
Banco-do-Brasil
Botão-limpar-limpo
DISTRITO FEDERAL
ESPÍRITO SANTO
Finanças
GOIÁS
MARANHÃO
MATO GROSSO DO SUL
PARAÍBA
PARÁ
PIAUÍ
RIO GRANDE DO SUL
RONDÔNIA
RORAIMA
SERGIPE
Sair do sistema
SÃO PAULO
TOCANTINS
Vmzn
banco-do-nordeste
botão cancelar
categorias.
clients
conecte-se
conexao-na-nuvem
confirmar
excluir
eye
financa
funcionarios
instagram
interesse
liberado
lupa
novo-documento
pescador
salve-
santander-logo
security
taxaDeJuros
troca
twitter
userLogin
whatsapp
x
ColoniaDePescadores.Simulador.FormFinanciamento.resources
$this.Icon
Informations
Name
Value
Module Name

oYlu.exe

Full Name

oYlu.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

oYlu.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

oYlu

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

oYlu.exe

Full Name

oYlu.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

oYlu.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

oYlu

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
Embedded Resources

14

Suspicious Type Names (1-2 chars)

0

c7d51d2ddcfedd7234d82016f3d1944b (1.25 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
ColoniaDePescadores.AreaDoPescador.resources
ColoniaDePescadores.FormProduto1.resources
$this.Icon
ColoniaDePescadores.FormProduto2.resources
ColoniaDePescadores.FormProduto3.resources
ColoniaDePescadores.FormProduto4.resources
ColoniaDePescadores.FormProduto5.resources
ColoniaDePescadores.FrmMenu.resources
ColoniaDePescadores.Login.resources
chb
statusStrip1.TrayLocation
ColoniaDePescadores.Parceiros.resources
ColoniaDePescadores.Properties.Resources.resources
ACRE
ALAGOAS
AMAPÁ
AMAZONAS
BAHIA
Banco-Itau
Banco-Votorantim
Banco-do-Brasil
Botão-limpar-limpo
DISTRITO FEDERAL
ESPÍRITO SANTO
Finanças
GOIÁS
MARANHÃO
MATO GROSSO DO SUL
PARAÍBA
PARÁ
PIAUÍ
RIO GRANDE DO SUL
RONDÔNIA
RORAIMA
SERGIPE
Sair do sistema
SÃO PAULO
TOCANTINS
Vmzn
banco-do-nordeste
botão cancelar
categorias.
clients
conecte-se
conexao-na-nuvem
confirmar
excluir
eye
financa
funcionarios
instagram
interesse
liberado
lupa
novo-documento
pescador
salve-
santander-logo
security
taxaDeJuros
troca
twitter
userLogin
whatsapp
x
ColoniaDePescadores.Simulador.FormFinanciamento.resources
$this.Icon
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

14

c7d51d2ddcfedd7234d82016f3d1944b

Suspicious Type Names (1-2 chars)

0

c7d51d2ddcfedd7234d82016f3d1944b

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙