Suspicious
Suspect

d8f3dfa6ff574a2a092deb1208e0eb0a

PE Executable
|
MD5: d8f3dfa6ff574a2a092deb1208e0eb0a
|
Size: 95.23 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
d8f3dfa6ff574a2a092deb1208e0eb0a
Sha1
b102c9deeb035b316f63b8d3cef376c1248b36e9
Sha256
429d1b3aceea5a9761994ffe3171e27572b82f6ff372c690b683acd812d604e3
Sha384
9955890a059715edcd692ce1742138e613a25d30816d9289e4e1a7d7bb38e2076e760f762470cf4b6f53ae3e60ed3d61
Sha512
78ae5cd96a1206d68b2b3902ae2bc53b3c4df152cd4e8093c54641ea004b94ebcc2ec38594032a7ae141851e6ec8c896814c75962c0c5157e59b3316f9020e4e
SSDeep
1536:rKOmC+xhUa9urgOB9RNvM4jEwzGi1dDlDSJgS:rKOgUa9urgONdGi1d5SG
TLSH
9F93D74977E56524E4BF56F75472F2004E34B48B1602E39E49F258EA0B33AC44F89EEB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Void Stub.A::main()

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

1272

Main Method

System.Void Stub.A::main()

Main IL Instruction Count

25

Main IL

nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runx ldnull <null> ldftn System.Void Stub.A::timx_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thx ldsfld System.Threading.Thread Stub.A::thx callvirt System.Void System.Threading.Thread::Start() nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runy ldnull <null> ldftn System.Void Stub.A::timy_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thy ldsfld System.Threading.Thread Stub.A::thy callvirt System.Void System.Threading.Thread::Start() nop <null> call System.Void Stub.Fransesco::ko() nop <null> nop <null> ret <null>

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Void Stub.A::main()

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

1272

Main Method

System.Void Stub.A::main()

Main IL Instruction Count

25

Main IL

nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runx ldnull <null> ldftn System.Void Stub.A::timx_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thx ldsfld System.Threading.Thread Stub.A::thx callvirt System.Void System.Threading.Thread::Start() nop <null> ldc.i4.1 <null> stsfld System.Boolean Stub.A::runy ldnull <null> ldftn System.Void Stub.A::timy_run() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stsfld System.Threading.Thread Stub.A::thy ldsfld System.Threading.Thread Stub.A::thy callvirt System.Void System.Threading.Thread::Start() nop <null> call System.Void Stub.Fransesco::ko() nop <null> nop <null> ret <null>

d8f3dfa6ff574a2a092deb1208e0eb0a (95.23 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙