Malicious
Malicious

fafa79f9adf092f90b9bb19fcd9158db

AutoIt Compiled Script
|
MD5: fafa79f9adf092f90b9bb19fcd9158db
|
Size: 1.3 MB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
fafa79f9adf092f90b9bb19fcd9158db
Sha1
3d6e1d5efc673c199cdea0909e6825e8e406f885
Sha256
7440ef0eba8981a16f223b10ccccd80671001258b5fd8e95e43161de32b1157d
Sha384
9689a39743b6f324b6ac949fdf7d78a76db1fb68967f79495f1762fd78ac613a79fbb26b82925e992d7186301c1be027
Sha512
59c133bd3f8f4f4c14830d6e84f85733c54cd1addc7081ccc2a177ad3ed036319c8b2c314de2efabf49cecfe859902a613f07f8a2f183326f9606930c16a0c9d
SSDeep
24576:Atb20pkaCqT5TBWgNQ7aFDDqKv8+rS7DL3ZWJCogK6A:JVg5tQ7aFDDdkTkJCoD5
TLSH
A155D02263DD8361C3B26273BA657701BEBF782506A5F56B2FD8093DE920121521EA73

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
autE91.tmp.tok
Malicious
[Cleaned].au3
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:2057
ID:0002
ID:2057
ID:0003
ID:2057
ID:0004
ID:2057
ID:0005
ID:2057
ID:0006
ID:2057
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
RT_STRING
ID:0007
ID:2057
ID:0008
ID:2057
ID:0009
ID:2057
ID:000A
ID:2057
ID:000B
ID:2057
ID:000C
ID:2057
ID:0139
ID:2057
RT_RCDATA
ID:0000
RT_GROUP_CURSOR4
ID:0063
ID:2057
ID:00A9
ID:2057
RT_VERSION
ID:0001
ID:2057
RT_MANIFEST
ID:0001
ID:2057
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ????

fafa79f9adf092f90b9bb19fcd9158db (1.3 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙