Malicious
Malicious

db6b71175ab4911eafcb668e81ae5110

AutoIt Compiled Script
|
MD5: db6b71175ab4911eafcb668e81ae5110
|
Size: 1.27 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
db6b71175ab4911eafcb668e81ae5110
Sha1
aa40605b5f92d3e2b30da0569ef603439f458d4a
Sha256
313386d99a89a5f9ab94206e9b951a2f8ed5d968a6b5d821c927ee5f3f83585f
Sha384
82dac11bbd054b57d693d912c400dcc05323184fcdac582b7130131cc46ec388a4585c2d99e7dcdd23eb9b2b602b82a5
Sha512
6a13aa64d4c0a9ac3f57e552a8370a928aa938dc77828a7ad5876102a210fe24de271e9907c1705396f1d822cfe2f3201bb109a3a7202abf0598d1fd4bd54d0a
SSDeep
24576:Q5EmXFtKaL4/oFe5T9yyXYfP1MAXDzpt9nYKYNd9io3zi6pbou:QPVt/LZeJbInGizplgiqzp
TLSH
DB45BF0273D1C066FFAB92334F56F6115ABC79260123A62F13981D7ABE701B1563E7A3

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
autF2A.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

db6b71175ab4911eafcb668e81ae5110 (1.27 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙