Malicious
General
Structural Analysis
Config.0
Yara Rules51
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
Hash | Hash Value |
---|---|
MD5 | cb772922bbf2355d0fef51206e194160
|
Sha1 | b59480d38331dbd32e9821b21370fa14c806517e
|
Sha256 | df77992422bc9eba5c7a23982417ee096e749ce1b656f102decc3f81b4265c0a
|
Sha384 | ee7a52ce72d4ef4ea6da65a0415c7238c268dccb6f38f6f9cabd4f5a74e3fc6520c4c3302d147033c236a7643f6095c6
|
Sha512 | 8af3d8c45d673d56b2fd18bc55b0facc540184e4fa19bdfccd7474994048d1fbb14ba5c0c3d100192f9551b27d444722bf67cde3d1ee0abc0a61a0c27828a8ea
|
SSDeep | 24576:Stb20pkaCqT5TBWgNQ7a6Mk1KbFAZDwfH4s6A:fVg5tQ7a6M8wAZDAH15
|
TLSH | 5745CF2373DDC3A5C3B25173BA667701AEBB782506A1F8EB2FD4093DE921121521E673
|
PeID
Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
cb772922bbf2355d0fef51206e194160
Executable
AutoIt
Suspect
Decompiled
PE (Portable Executable)
Win 32 Exe
x86
PDB Path
Malicious
aut1FEA.tmp.tok
AutoIt
Suspect
Decompiled
Malicious
[Cleaned].au3
AutoIt
Suspect
Decompiled
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
ID:0
Executable
AutoIt
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Artefacts
Name0 | Value |
---|---|
PDB Path | ???? |
cb772922bbf2355d0fef51206e194160 (1.19 MB)
File Structure
cb772922bbf2355d0fef51206e194160
Executable
AutoIt
Suspect
Decompiled
PE (Portable Executable)
Win 32 Exe
x86
PDB Path
Malicious
aut1FEA.tmp.tok
AutoIt
Suspect
Decompiled
Malicious
[Cleaned].au3
AutoIt
Suspect
Decompiled
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
ID:0
Executable
AutoIt
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Characteristics
No malware configuration were found at this point.
Artefacts
Name0 | Value | Location |
---|---|---|
PDB Path | ???? |
cb772922bbf2355d0fef51206e194160 |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.