PESCAN.IO - Analysis Report |
|||||
File Structure: | |||||
![]() |
Information: |
Icon: Size: 372,00 KBSHA-256 Hash: D85DEEFA11AD8A4549965FAE741A813179BD29F6402F419C7B0193873E79EA67 SHA-1 Hash: 017B61C38A670A261823D54CEBE66C265FCED3F8 MD5 Hash: D26BDDBBED0816F0AE9DE325CE8FBB49 Imphash: F34D5F2D4577ED6D9CEEC516C1F5A744 MajorOSVersion: 4 CheckSum: 00000000 EntryPoint (rva): 3D2E SizeOfHeaders: 200 SizeOfImage: 62000 ImageBase: 400000 Architecture: x86 ImportTable: 3CD4 Characteristics: 102 TimeDateStamp: 686277EB Date: 30/06/2025 11:41:31 File Type: EXE Number Of Sections: 3 ASLR: Disabled Section Names: .text, .rsrc, .reloc Number Of Executable Sections: 1 Subsystem: Windows GUI UAC Execution Level Manifest: asInvoker |
Sections Info: |
Section Name | Flags | ROffset | RSize | VOffset | VSize |
---|---|---|---|---|---|
.text | 60000020 (Executable) | 200 | 1E00 | 2000 | 1D34 |
.rsrc | 40000040 | 2000 | 5AE00 | 4000 | 5AD36 |
.reloc | 42000040 | 5CE00 | 200 | 60000 | C |
Description: |
InternalName: Document1.exe OriginalFilename: Document1.exe CompanyName: MailEnable Pty Ltd LegalCopyright: MailEnable Pty Ltd FileVersion: 10.53.0.0 |
Entry Point: |
The section number (1) - (.text) have the Entry Point Information -> EntryPoint (calculated) - 1F2E Code -> FF25002040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 • JMP DWORD PTR [0X402000] • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL |
Signatures: |
Certificate - Digital Signature Not Found: • The file is not signed |
Packer/Compiler: |
Compiler: Microsoft Visual .NET - (You can use a decompiler for this...) • AnyCPU: False • Version: v4.0 Detect It Easy (die) • PE: library: .NET(v4.0.30319)[-] • PE: linker: Microsoft Linker(8.0)[EXE32] • Entropy: 5.94053 |
File Access: |
Document1.exe mscoree.dll Temp |
File Access (UNICODE): |
Document1.exe |
Interest's Words: |
<title exec attrib start |
URLs (UNICODE): |
http://45.141.233.27/upload/Ivzxtgz.wav |
IP Addresses: |
10.53.0.0 45.141.233.27 10.53.0.0 |
Strings/Hex Code Found With The File Rules: |
• Rule Text (Ascii): Stealer malware focused on obtaining CVV codes to conduct unauthorized transactions (CVV) • EP Rules: Microsoft Visual C / Basic .NET • EP Rules: Microsoft Visual C++ 8 • EP Rules: Microsoft Visual C++ 8.0 • EP Rules: Microsoft Visual C v7.0 / Basic .NET • EP Rules: Microsoft Visual Studio .NET • EP Rules: .NET executable • EP Rules: TrueVision Targa Graphics format |
Resources: |
Path | DataRVA | Size | FileOffset | Code | Text |
---|---|---|---|---|---|
\ICON\1\0 | 4220 | 42028 | 2220 | 2800000000010000000200000100200000000000000004000000000000000000000000000000000000000000000000000000 | (............. ................................... |
\ICON\2\0 | 46248 | 10828 | 44248 | 2800000080000000000100000100200000000000000001000000000000000000000000000000000000000000000000000000 | (............. ................................... |
\ICON\3\0 | 56A70 | 4228 | 54A70 | 2800000040000000800000000100200000000000004000000000000000000000000000000000000000000000000000000000 | (...@......... ......@............................ |
\ICON\4\0 | 5AC98 | 25A8 | 58C98 | 2800000030000000600000000100200000000000002400000000000000000000000000000000000000000000000000000000 | (...0........ ......$............................ |
\ICON\5\0 | 5D240 | 10A8 | 5B240 | 2800000020000000400000000100200000000000001000000000000000000000000000000000000000000000000000000000 | (... ...@..... ................................... |
\ICON\6\0 | 5E2E8 | 468 | 5C2E8 | 2800000010000000200000000100200000000000000400000000000000000000000000000000000000000000000000000000 | (....... ..... ................................... |
\GROUP_ICON\32512\0 | 5E750 | 5A | 5C750 | 0000010006000000000001002000282004000100808000000100200028080100020040400000010020002842000003003030000001002000A825000004002020000001002000A810000005001010000001002000680400000600 | ............ .( .......... .(.....@@.... .(B....00.... ..%.... .... ............. .h..... |
\VERSION\1\0 | 5E7AC | 3A0 | 5C7AC | A00334000000560053005F00560045005200530049004F004E005F0049004E0046004F0000000000BD04EFFE000001003500 | ..4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............5. |
\24\1\0 | 5EB4C | 1EA | 5CB4C | EFBBBF3C3F786D6C2076657273696F6E3D22312E302220656E636F64696E673D225554462D3822207374616E64616C6F6E65 | ...<?xml version="1.0" encoding="UTF-8" standalone |
Intelligent String: |
• 10.53.0.0 • Document1.exe • http://45.141.233.27/upload/Ivzxtgz.wav • _CorExeMainmscoree.dll |
Extra 4n4lysis: |
Metric | Value | Percentage |
---|---|---|
Ascii Code | 168315 | 44,1855% |
Null Byte Code | 83860 | 22,0147% |
© 2025 All rights reserved.