81d1e7ed332cf75800f18848df764fe6

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2022-Jan-13 14:19:00
FileDescription
FileVersion 0.0.0.0
InternalName MaxiRaccolta2.0.exe
LegalCopyright
OriginalFilename MaxiRaccolta2.0.exe
ProductVersion 0.0.0.0
Assembly Version 0.0.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
Suspicious Strings found in the binary may indicate undesirable behavior: Looks for Qemu presence:
  • QemU
May have dropper capabilities:
  • CurrentVersion\Run
Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • bitpanda.com
  • coinmama.com
  • http://www.w3.org
  • http://www.w3.org/2001/XMLSchema
  • http://www.w3.org/2001/XMLSchema-instance
  • www.bitpanda.com
  • www.coinmama.com
  • www.w3.org
Malicious VirusTotal score: 40/65 (Scanned on 2022-01-13 22:37:35) Lionic: Trojan.Win32.Generic.j!c
Elastic: malicious (high confidence)
Cynet: Malicious (score: 99)
CAT-QuickHeal: Trojan.MsilFC.S23210427
ALYac: IL:Trojan.MSILZilla.5554
Cylance: Unsafe
Sangfor: Trojan.Win32.Save.a
Alibaba: Ransom:MSIL/FileCoder.9bcd4b18
CrowdStrike: win/malicious_confidence_90% (W)
ESET-NOD32: a variant of MSIL/Filecoder.AGP
APEX: Malicious
Avast: Win32:RansomX-gen [Ransom]
ClamAV: Win.Ransomware.Hydracrypt-9878672-0
Kaspersky: HEUR:Trojan-Ransom.Win32.Generic
BitDefender: IL:Trojan.MSILZilla.5554
MicroWorld-eScan: IL:Trojan.MSILZilla.5554
Tencent: Win32.Trojan.Generic.Eawv
Ad-Aware: IL:Trojan.MSILZilla.5554
Sophos: ML/PE-A
F-Secure: Heuristic.HEUR/AGEN.1138919
DrWeb: Trojan.Encoder.34437
McAfee-GW-Edition: GenericRXQG-EP!81D1E7ED332C
FireEye: Generic.mg.81d1e7ed332cf758
Emsisoft: IL:Trojan.MSILZilla.5554 (B)
Ikarus: Trojan-Ransom.Penta
GData: MSIL.Trojan-Ransom.Remind.B
Avira: HEUR/AGEN.1138919
Arcabit: IL:Trojan.MSILZilla.D15B2
Microsoft: Ransom:MSIL/FileCoder.AD!MTB
AhnLab-V3: Malware/Win.Generic.C4581699
McAfee: GenericRXQG-EP!81D1E7ED332C
MAX: malware (ai score=81)
Malwarebytes: Malware.AI.3384415825
Rising: Ransom.Destructor!1.B060 (CLASSIC)
SentinelOne: Static AI - Malicious PE
MaxSecure: Trojan.Malware.300983.susgen
Fortinet: MSIL/Filecoder.AGP!tr.ransom
BitDefenderTheta: AI:Packer.85A25CC51F
AVG: Win32:RansomX-gen [Ransom]
Cybereason: malicious.d332cf

Hashes

MD5 81d1e7ed332cf75800f18848df764fe6
SHA1 c17bb08354a29d87b5b682f67214167388daca00
SHA256 076ef4ca884b774579713f120329d8c3b7b973f41ff17a50f221cd3d3bbf1377
SHA3 76cc61614036906a8831da1326c698d8151a08f97fe74318dee0d05b02b478dd
SSDeep 12288:K/0F4QoLcwX5lzxTZWMhZA5fCcUDIuJ7S8Lmftj58PUu545/QGAulW5fAPlEX6V:C0SOfpQ3KfrtlWvanJUWuivEqEn6NEO
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2022-Jan-13 14:19:00
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 11.0
SizeOfCode 0x142600
SizeOfInitializedData 0x35800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x001443FE (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x146000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x17e000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 565d049e43c0c21e36ce5f39ffadccc0
SHA1 d3b10b1c07b16d4c437a3244bf4005c30e366341
SHA256 9383d38a47396172c817d62cf060502404711eae0bbac7c7199c255033e80e1f
SHA3 1e326ec72f199130ea2ba588e19e038a8685b085958866c7f604b11727192fe3
VirtualSize 0x142404
VirtualAddress 0x2000
SizeOfRawData 0x142600
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 4.05846

.rsrc

MD5 1b2777b3cd98c54b380b513015c8d6c2
SHA1 0ce354815ef91b3e44927d100eab1684cca6d434
SHA256 2648bd406c85fee4cb9f7a408641efb11bcaec884082eb39feaf14bdcc94646e
SHA3 98e90d6e6e3bf82aff14d5f85e22cb07c8a6ec7abebe9ac2954920a1b8eaae83
VirtualSize 0x355c8
VirtualAddress 0x146000
SizeOfRawData 0x35600
PointerToRawData 0x142800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.61257

.reloc

MD5 8c4e04e64c88fb26aaa3c623481125ec
SHA1 31bb73da5c71b979719603b239ac2797606243b7
SHA256 59594af4bf7cfd0b7524d6f6d9f83cc767a768a971fb28566f2074bd1449e4bf
SHA3 19ccaf28bc065d24d3bab6c726aac30566032bab31b1129e9b9c18ae68a4495d
VirtualSize 0xc
VirtualAddress 0x17c000
SizeOfRawData 0x200
PointerToRawData 0x177e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0815394

Imports

mscoree.dll _CorExeMain

Delayed Imports

2

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x35028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.60896
MD5 febefcd5ffc9d9329d70ad48a9bae682
SHA1 db3db69a9f60ef6276b48a16335af8ca3cba6be5
SHA256 e81411677db8ef9ab9dde3d1df5fa4582fa6cd951ede0a760469b0a6b9f6ad30
SHA3 1fdd368fa81566932778a04501c0a23aa3b777cdae558ccc42dae2d9cafa3c89

32512

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.1815
Detected Filetype Icon file
MD5 91b0e77aa69b5713e0e495313953a082
SHA1 931b8afd03a729cc267162e49d6ca2b940df13f8
SHA256 07139e06d2f40287cc2a1122adedf3852868935700a52420f523e16807acd19d
SHA3 fdc3c888b4a78b46dd860d0c77cc42251758bd9fd44980416d162be6ef4d4b2a

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x264
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.19981
MD5 d820b6a0e61bdce01f34d477849e55ee
SHA1 fa31a1f7928a5e67555ae685d908098b632279ec
SHA256 e722ffd775d6ceabaf23db42d20110b84235b5a459cb9ca16f5f4ed30ee96cea
SHA3 dfdb68a5294c8a473ac8e91044be30b0e237aa942b421cbd201bebd780199763

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 a19a2658ba69030c6ac9d11fd7d7e3c1
SHA1 879dcf690e5bf1941b27cf13c8bcf72f8356c650
SHA256 c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f
SHA3 93cbaf236d2d3870c1052716416ddf1c34f21532e56dd70144e9a01efcd0ce34

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 0.0.0.0
ProductVersion 0.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
FileDescription
FileVersion (#2) 0.0.0.0
InternalName MaxiRaccolta2.0.exe
LegalCopyright
OriginalFilename MaxiRaccolta2.0.exe
ProductVersion (#2) 0.0.0.0
Assembly Version 0.0.0.0
Resource LangID UNKNOWN

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->