Malicious
Malicious

f01e7c38b1d307924929e21a4b394463

AutoIt Compiled Script
|
MD5: f01e7c38b1d307924929e21a4b394463
|
Size: 1.2 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
f01e7c38b1d307924929e21a4b394463
Sha1
b407c31fba5f7ba847f20fd03dce1add1abaf66f
Sha256
11cc53e72e2f50f162ecbf30fe545b9fbdec4527ae1fb36522a563e8303894fc
Sha384
a403b386837a20313abe2a3d2639becf81b69d94ffa603d013c59a2d0b4627e26c1d0100e94f14e02dc41d9dfea05de1
Sha512
c90e986464b3a22c403fe973c4021b7c8f28c8c44fa6135859741373b9966b93080a5b9830204750ddd0f8c5014f1c097655ab5e6cdb1517bd05b5d10c718f8c
SSDeep
24576:vtb20pkaCqT5TBWgNQ7aqzKMSGihRzDojBSL6A:sVg5tQ7aqOFGivojS5
TLSH
C445CF1373DEC365C3B25273BA16B701AEBB782506B5F96B2FD4093DE920122521E673

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut5416.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ????

f01e7c38b1d307924929e21a4b394463 (1.2 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙