Malicious
Malicious

f60e3c766b93c52c03e6082569f025fc

AutoIt Compiled Script
|
MD5: f60e3c766b93c52c03e6082569f025fc
|
Size: 1.3 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
f60e3c766b93c52c03e6082569f025fc
Sha1
9eb340ba199c920fb4c2c327019f5cc034f6e0af
Sha256
a4da1f0a04d200fcdfc2e462cdb980f10603625ebe20f7e00d1f9ce4db8b139e
Sha384
50715c5962bede833c6b520b73367acaba1e381144b1f736a7367065336b73eaf2c05b24e5268f4de64b07f191fb9999
Sha512
3dc1d7ae22ef84658481eb48d6a90ee08617bfb723f92aa7bfcf63fd7e3ba02ecc31851240854b57cbf3f1bae9ab640ac94e9571afefc5011d972024cf10c49d
SSDeep
24576:6tb20pkaCqT5TBWgNQ7arWVnomG6xdStdNhoxKiGY96A:nVg5tQ7arW7GfNGso5
TLSH
4855D02373DD8360C3B25273BA667701BEBB782506A5F56B2FD4093DE820162561EB73

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
autA338.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ????

f60e3c766b93c52c03e6082569f025fc (1.3 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙