Suspicious
Suspect

eb809d13e3ca65bec116de1667a86845

PE Executable
|
MD5: eb809d13e3ca65bec116de1667a86845
|
Size: 2.11 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
eb809d13e3ca65bec116de1667a86845
Sha1
3a1bbf0786eb07babbafc325d333fad89af21649
Sha256
d25dfa969fe9641d922a89fd2d123b2d8aa4f30843c8f09edeaa4fa9d9909394
Sha384
75abc8a26a964d936618d1e95d077ddf7f4f94c2f00dc8c2ed3139c30d7f95093ac5ecc90da7053e2c9181d53e5710fb
Sha512
ca47092509befd16f666cb0fbf9ec8559421d049a74145f455a218fd598bc12176833e6344d650402e655bd9c0d6117fe9937907b234c040acb1a6a5f30ee4e4
SSDeep
49152:ABRGTpc8iYM5pF9UBB6jdLXsuuX4/cqZIiQx6lSONx:aATFM5pXUBB6BLXTuoEXx6lSONx
TLSH
C7A52342F8C485F3C4511C331B65A7616A7DBE202F268EDBB3856B1DE9614D0EB31AF2

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
oxi4kambz.bat
saked
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:25
ID:25-preview.png
ID:0066
ID:25
ID:25-preview.png
RT_ICON
ID:0001
ID:25
ID:0002
ID:25
ID:0003
ID:25
ID:0004
ID:25
ID:0005
ID:25
ID:0006
ID:25
ID:0007
ID:25
ID:25-preview.png
RT_DIALOG
ID:0000
ID:25
RT_STRING
ID:0007
ID:25
ID:0008
ID:25
ID:0009
ID:25
ID:000A
ID:25
ID:000B
ID:25
ID:000C
ID:25
ID:000D
ID:25
ID:000E
ID:25
ID:000F
ID:25
ID:0010
ID:25
RT_GROUP_CURSOR4
ID:0064
ID:25
RT_MANIFEST
ID:0001
ID:25
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_533a2f78.bin (1788976 bytes)

Info

PDB Path: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

eb809d13e3ca65bec116de1667a86845 (2.11 MB)
File Structure
oxi4kambz.bat
saked
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:25
ID:25-preview.png
ID:0066
ID:25
ID:25-preview.png
RT_ICON
ID:0001
ID:25
ID:0002
ID:25
ID:0003
ID:25
ID:0004
ID:25
ID:0005
ID:25
ID:0006
ID:25
ID:0007
ID:25
ID:25-preview.png
RT_DIALOG
ID:0000
ID:25
RT_STRING
ID:0007
ID:25
ID:0008
ID:25
ID:0009
ID:25
ID:000A
ID:25
ID:000B
ID:25
ID:000C
ID:25
ID:000D
ID:25
ID:000E
ID:25
ID:000F
ID:25
ID:0010
ID:25
RT_GROUP_CURSOR4
ID:0064
ID:25
RT_MANIFEST
ID:0001
ID:25
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙