PESCAN.IO - Analysis Report |
||
File Structure: | ||
![]() |
Information: |
Size: 1,58 MB SHA-256 Hash: AD80C7781D60F18DAA92E7EE6FDF1F885B0E7BB9B5FDC74D686EC04208D31E86 SHA-1 Hash: 43677E8ABDF80A112F70446C0FA2B65F36006DDA MD5 Hash: 7EDC2F1C2EEAC6DE4E3C862126BABC64 Imphash: D41D8CD98F00B204E9800998ECF8427E MajorOSVersion: 4 CheckSum: 0319A955 EntryPoint (rva): F000046B SizeOfHeaders: 30001000 SizeOfImage: C0745E73 ImageBase: F0400000 Architecture: x86 ExportTable: F07E7000 ImportTable: F0895424 Characteristics: FF0E TimeDateStamp: F0000444 Date: 05/08/2097 9:22:12 File Type: EXE Number Of Sections: 13107 ASLR: Disabled Number Of Executable Sections: 872 Subsystem: -4094 |
Binder/Joiner/Crypter: |
Dropper code detected (EOF) - 1018,31 MB |
Entry Point: |
The section number (13104) have the Entry Point Information -> EntryPoint (calculated) - FFF9CD80 |
Signatures: |
Certificate - Digital Signature: • The file is not signed |
Duplicate Sections: |
Section duplicate 2 times |
Packer/Compiler: |
Compiler: Microsoft Visual C ++ Detect It Easy (die) • PE: protector: Armadillo(6.X-9.X)[-] • PE: linker: Turbo Linker(83.82)[DLL32] • Entropy: 7.60235 |
Suspicious Functions: |
Library | Function | Description |
---|---|---|
KERNEL32.DLL | CreateMutexA | Create a named or unnamed mutex object for controlling access to a shared resource. |
KERNEL32.DLL | GetModuleFileNameA | Retrieve the fully qualified path for the executable file of a specified module. |
KERNEL32.DLL | VirtualAlloc | Reserve, commit, or both, a region of memory within the virtual address space of a process. |
KERNEL32.DLL | GetModuleHandleA | Retrieves a handle to the specified module. |
KERNEL32.DLL | WriteFile | Writes data to a specified file or input/output (I/O) device. |
KERNEL32.DLL | LoadLibraryA | Loads the specified module into the address space of the calling process. |
KERNEL32.DLL | WriteProcessMemory | Writes data to an area of memory in a specified process. |
KERNEL32.DLL | ReadProcessMemory | Reads data from an area of memory in a specified process. |
KERNEL32.DLL | GetProcAddress | Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL). |
KERNEL32.DLL | CreateFileA | Creates or opens a file or I/O device. |
KERNEL32.DLL | IsDebuggerPresent | Determines if the calling process is being debugged by a user-mode debugger. |
USER32.DLL | GetAsyncKeyState | Retrieves the status of a virtual key asynchronously. |
File Access: |
Shell.exe GDI32.dll USER32.dll KERNEL32.dll mscoree.dll ComDlg32.dll COMCTL32.DLL Temp |
File Access (UNICODE): |
Temp |
Interest's Words: |
ToolBar cscript exec start shutdown ping expand |
URLs: |
http://ocsp.verisign.com http://crl.verisign.com/tss-ca.crl http://crl.verisign.com/ThawteTimestampingCA.crl http://crl.verisign.com/pca3.crl http://CSC3-2004-crl.verisign.com/CSC3-2004.crl http://CSC3-2004-aia.verisign.com/CSC3-2004-aia.cer http://www.dposoft.net0 https://www.verisign.com/rpa https://www.verisign.com/rpa01 https://www.verisign.com/rpa0 |
Payloads: |
Unusual NOPS Space > 30 Bytes - (0x90909090909090909090...) |
Strings/Hex Code Found With The File Rules: |
• Rule Text (Ascii): WinAPI Sockets (connect) • Rule Text (Ascii): File (CreateFile) • Rule Text (Ascii): File (WriteFile) • Rule Text (Ascii): Anti-Analysis VM (IsDebuggerPresent) • Rule Text (Ascii): Anti-Analysis VM (GetVersion) • Rule Text (Ascii): Stealth (VirtualAlloc) • Rule Text (Ascii): Stealth (VirtualProtect) • Rule Text (Ascii): Stealth (ReadProcessMemory) • Rule Text (Ascii): Execution (CreateProcessA) • Rule Text (Ascii): Execution (CreateProcessW) • Rule Text (Ascii): Execution (ResumeThread) • Rule Text (Ascii): Stealer malware focused on obtaining CVV codes to conduct unauthorized transactions (CVV) |
Intelligent String: |
• .PAD • KERNEL32.DLL • kernel32.dll • COMCTL32.DLL • Kernel32.dll • User32.dll • ComDlg32.dll • RCreateDialogIndirectParamA • USER32.dll • MAINICON |
Extra 4n4lysis: |
Metric | Value | Percentage |
---|---|---|
Ascii Code | 1055395 | 63,6209% |
Null Byte Code | 152392 | 9,1864% |
NOP Cave Found | 0x9090909090 | Block Count: 1802 | Total: 0,2716% |
© 2025 All rights reserved.