Malicious
Malicious

fa03b984cdf11671471c1360fb31cf55

AutoIt Compiled Script
|
MD5: fa03b984cdf11671471c1360fb31cf55
|
Size: 1.32 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
fa03b984cdf11671471c1360fb31cf55
Sha1
679e552fe6490a1b398f1c19bf40ba1de927f81b
Sha256
6e135160c22ee220839ecc04ed6f325f75b04869763dede90bb0a35811ccb32c
Sha384
09d86040f193d97610326e2b763f44993555170b94782d1241e38991774e91de05b729f5503ece1003ee60db9d20bf1c
Sha512
f52c792063c6566fe453ee159f03cd0efff20d26a425eb54f96ee9fb79e6d5a8efaefd7f0ffba0c249f4df1c056484de0c6c7dd4a80ecffd54762bd2fcfab0fd
SSDeep
24576:Qtb20pkaCqT5TBWgNQ7azH9DJPwS3Bj81PIFnLSsRH6A:ZVg5tQ7azHM0j81PQp5
TLSH
3355D01263DE8371C7B25273BA16B751AE7B7C2506B1F96B2FD8093CF920121521EA73

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
aut1A86.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
RT_MENU
ID:00A6
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A2
ID:2057
ID:00A4
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ????

fa03b984cdf11671471c1360fb31cf55 (1.32 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙