Malicious
Malicious

dbfb8c461d468566f55984fa3c2367d1

AutoIt Compiled Script
|
MD5: dbfb8c461d468566f55984fa3c2367d1
|
Size: 1.23 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
dbfb8c461d468566f55984fa3c2367d1
Sha1
127d98f31eb2856b4b449ddb6516399276acee1b
Sha256
4cff3833a6be883d48baa6d083f723aafab1b015a75b592808a02d1d82e0e1fa
Sha384
41d481ea5fbffd030a6acdc18ee72cf309cd21823bec22a4a82d520af2166dac6ec644e34774870fc2cb7d4211fc6a57
Sha512
f54a8baaeb07e766ddca7258e48e9b10087c7bc3cb66be423d95f5043618e82438cc1a582de63fb856c88f4bebd8f9849e02dea899f1c364108f5bf9ae9f2eb5
SSDeep
24576:T5EmXFtKaL4/oFe5T9yyXYfP1ijXdauR4UB3rBeqS6Se:TPVt/LZeJbInQRaueUB3rUqV
TLSH
3C45BE0273D1D062FFAB92734F5AF6115ABC79260123A62F13981D79BE701B1463E7A3

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut5483.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: t$di

dbfb8c461d468566f55984fa3c2367d1 (1.23 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙