Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 1970-Jan-01 00:00:00 |
Suspicious | PEiD Signature: | PeStubOEP v1.x |
Suspicious | Strings found in the binary may indicate undesirable behavior: |
Miscellaneous malware strings:
|
Info | Cryptographic algorithms detected in the binary: |
Uses constants related to MD5
Uses constants related to SHA256 Uses constants related to SHA512 Uses constants related to AES |
Suspicious | The PE is possibly packed. | Unusual section name found: .symtab |
Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
Malicious | VirusTotal score: 51/72 (Scanned on 2025-01-13 07:02:36) |
ALYac:
Gen:Variant.Ulise.497390
AVG: Win32:MalwareX-gen [Trj] Alibaba: Ransom:Win64/Ransomhub.daebfd21 Antiy-AVL: Trojan[Ransom]/Win64.Agent Arcabit: Trojan.Ulise.D796EE Avast: Win32:MalwareX-gen [Trj] Avira: TR/Redcap.ygonk BitDefender: Gen:Variant.Ulise.497390 Bkav: W32.Common.E2556061 CAT-QuickHeal: Trojan.Ghanarava.1730676076fd5c70 CTX: exe.ransomware.generic CrowdStrike: win/malicious_confidence_60% (W) Cylance: Unsafe DeepInstinct: MALICIOUS ESET-NOD32: a variant of WinGo/Filecoder.RansomHub.A Elastic: Multi.Ransomware.RansomHub Emsisoft: Gen:Variant.Ulise.497390 (B) F-Secure: Trojan.TR/Redcap.ygonk FireEye: Gen:Variant.Ulise.497390 Fortinet: W32/PossibleThreat GData: Gen:Variant.Ulise.497390 Google: Detected Ikarus: Trojan.Crypt K7AntiVirus: Riskware ( 00584baa1 ) K7GW: Riskware ( 00584baa1 ) Kaspersky: HEUR:Trojan-Ransom.Win64.Generic Kingsoft: Win64.Trojan-Ransom.Generic.a Lionic: Trojan.Win32.Agentb.tsE2 Malwarebytes: Malware.AI.1113815213 MaxSecure: Trojan.Malware.313106256.susgen McAfee: Ransom-Hub.a McAfeeD: ti!83654C500C68 MicroWorld-eScan: Gen:Variant.Ulise.497390 Microsoft: Ransom:Win64/Ransomhub.B Paloalto: generic.ml Panda: Trj/CI.A Sangfor: Ransom.Win64.Ransomhub.V21y Skyhigh: Ransom-Hub.a Sophos: Troj/RnsmHub-A Symantec: Ransom.Ransomhub!g1 Tencent: Win64.Trojan-Ransom.Generic.Hajl TrendMicro: Ransom_Ransomhub.R002C0DGS24 TrendMicro-HouseCall: Ransom_Ransomhub.R002C0DGS24 VIPRE: Gen:Variant.Ulise.497390 Varist: W32/Filecoder.JU.gen!Eldorado VirIT: Trojan.Win32.Genus.WDU Webroot: W32.Trojan.Gen Xcitium: Malware@#fim293biv0sk Zillya: Trojan.Generic.Win64.734 alibabacloud: Ransomware:Multi/RansomHub.A huorong: HEUR:HackTool/Sliver.a |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0x4 |
e_cparhdr | 0 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0x8b |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x80 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 6 |
TimeDateStamp | 1970-Jan-01 00:00:00 |
PointerToSymbolTable | 0xa76e00 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
|
Magic | PE32 |
---|---|
LinkerVersion | 3.0 |
SizeOfCode | 0x708c00 |
SizeOfInitializedData | 0x1fe00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00058790 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0xa29000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 6.1 |
ImageVersion | 1.0 |
SubsystemVersion | 6.1 |
Win32VersionValue | 0 |
SizeOfImage | 0xaa7000 |
SizeOfHeaders | 0x400 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
kernel32.dll |
WriteFile
WriteConsoleW WaitForMultipleObjects WaitForSingleObject VirtualQuery VirtualFree VirtualAlloc SwitchToThread SuspendThread SetWaitableTimer SetUnhandledExceptionFilter SetProcessPriorityBoost SetEvent SetErrorMode SetConsoleCtrlHandler ResumeThread PostQueuedCompletionStatus LoadLibraryA LoadLibraryW SetThreadContext GetThreadContext GetSystemInfo GetSystemDirectoryA GetStdHandle GetQueuedCompletionStatusEx GetProcessAffinityMask GetProcAddress GetEnvironmentStringsW GetConsoleMode FreeEnvironmentStringsW ExitProcess DuplicateHandle CreateWaitableTimerExW CreateThread CreateIoCompletionPort CreateFileA CreateEventA CloseHandle AddVectoredExceptionHandler |
---|