General
Structural Analysis
Config.1
Yara Rules49
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Low
Hash | Hash Value |
---|---|
MD5 | f7e39871441b58ac51c2ac7cda3512bf
|
Sha1 | 49af19781f5eaa77c9ac97edc94a56726ca55536
|
Sha256 | 9fd0eaf75124db45051e5c3b0561b3e8c80af9459fcddf09289698b4acc42096
|
Sha384 | dd6781324837639d2ea61b2a509f114805e9c8c85d7ae7baf9b19fd6d368be126d06fbf2ddc193a119234fe747d16708
|
Sha512 | 72e083409fd864cf50bb93494897ba112c99f4bb6116835bf3b1dda7c07faee752ed38aaae61727c360679aa6ef42dbeeb61171f239123a642dc937120d20125
|
SSDeep | 1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2D3teulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdPY
|
TLSH | 5CA35D20679C9F19EAFD1B74B4B2012043F1E08A9091FB4B4DC1A4E71FA7B865957EF2
|
PeID
.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
f7e39871441b58ac51c2ac7cda3512bf
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - RedLine Config.
Config. Field0 | Value |
---|---|
[Configuration Module Name] | EntryPoint |
[Configuration Module Full Name] | EntryPoint |
Informations
Name0 | Value |
---|---|
Info | PE Detect: PeReader OK (file layout) |
Module Name | Happy.exe |
Full Name | Happy.exe |
EntryPoint | System.Void Program::Main(System.String[]) |
Scope Name | Happy.exe |
Scope Type | ModuleDef |
Kind | Console |
Runtime Version | v4.0.30319 |
Tables Header Version | 512 |
WinMD Version | <null> |
Assembly Name | Happy |
Assembly Version | 0.0.0.0 |
Assembly Culture | <null> |
Has PublicKey | False |
PublicKey Token | <null> |
Target Framework | .NETFramework,Version=v4.0 |
Total Strings | 234 |
Main Method | System.Void Program::Main(System.String[]) |
Main IL Instruction Count | 3 |
Main IL | newobj System.Void EntryPoint::.ctor() call System.Void Program::Execute(EntryPoint) ret <null> |
Module Name | Happy.exe |
Full Name | Happy.exe |
EntryPoint | System.Void Program::Main(System.String[]) |
Scope Name | Happy.exe |
Scope Type | ModuleDef |
Kind | Console |
Runtime Version | v4.0.30319 |
Tables Header Version | 512 |
WinMD Version | <null> |
Assembly Name | Happy |
Assembly Version | 0.0.0.0 |
Assembly Culture | <null> |
Has PublicKey | False |
PublicKey Token | <null> |
Target Framework | .NETFramework,Version=v4.0 |
Total Strings | 234 |
Main Method | System.Void Program::Main(System.String[]) |
Main IL Instruction Count | 3 |
Main IL | newobj System.Void EntryPoint::.ctor() call System.Void Program::Execute(EntryPoint) ret <null> |
f7e39871441b58ac51c2ac7cda3512bf (97.79 KB)
File Structure
f7e39871441b58ac51c2ac7cda3512bf
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - RedLine Config.
Config. Field0 | Value |
---|---|
[Configuration Module Name] | EntryPoint |
[Configuration Module Full Name] | EntryPoint |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.