| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2021-Nov-26 10:08:37 |
| Debug artifacts |
c:\Users\SS COmputer\AppData\Local\Temp\bin_copy\obj\Debug\fury.sp.pdb
|
| FileDescription | fury.sp |
| FileVersion | 1.9 |
| InternalName | fury.sp.exe |
| LegalCopyright | |
| OriginalFilename | fury.sp.exe |
| ProductVersion | 1.9 |
| Assembly Version | 1.9.0.0 |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
|
| Suspicious | The file contains overlay data. | 7537320 bytes of data starting at offset 0x2dd600. |
| Malicious | VirusTotal score: 38/65 (Scanned on 2021-11-29 20:30:48) |
Elastic:
malicious (high confidence)
ClamAV: Win.Packed.Bulz-9853289-0 CAT-QuickHeal: Trojan.YakbeexMSIL.ZZ4 McAfee: PUP-XOG-WS Sangfor: Suspicious.Win32.Save.a CrowdStrike: win/malicious_confidence_70% (D) K7GW: Trojan ( 0057bd891 ) K7AntiVirus: Trojan ( 0057bd891 ) BitDefenderTheta: Gen:NN.ZemsilF.34062.@p3@a01bWFn Cyren: W32/Bulz.AU.gen!Eldorado ESET-NOD32: a variant of MSIL/Agent.UKY Avast: Win32:RATX-gen [Trj] Cynet: Malicious (score: 99) Kaspersky: Trojan-PSW.Win32.Disco.q BitDefender: Gen:Variant.Bulz.424747 MicroWorld-eScan: Gen:Variant.Bulz.424747 Ad-Aware: Gen:Variant.Bulz.424747 Sophos: Mal/MSIL-UO DrWeb: BAT.Disabler.24 McAfee-GW-Edition: PUP-XOG-WS FireEye: Generic.mg.7440ae457b39ad53 Emsisoft: Gen:Variant.Bulz.424747 (B) SentinelOne: Static AI - Malicious PE GData: Gen:Variant.Bulz.424747 Avira: TR/Spy.Agent.vqkxt Arcabit: Trojan.Bulz.D67B2B APEX: Malicious Microsoft: Trojan:MSIL/Agent.UKY!MTB AhnLab-V3: Trojan/Win.Generic.C4418359 VBA32: TScope.Trojan.MSIL ALYac: Gen:Variant.Bulz.424747 MAX: malware (ai score=83) Malwarebytes: Trojan.PolDis Ikarus: PWS.MSIL.Dcstl MaxSecure: Trojan.Malware.121218.susgen Fortinet: MSIL/Agent.F0B7!tr AVG: Win32:RATX-gen [Trj] Cybereason: malicious.7418a6 |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 2021-Nov-26 10:08:37 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 11.0 |
| SizeOfCode | 0x2d6800 |
| SizeOfInitializedData | 0x6c00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x002D875E (Section: .text) |
| BaseOfCode | 0x2000 |
| BaseOfData | 0x2da000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x2000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x2e4000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| mscoree.dll |
_CorExeMain
|
|---|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.9.0.0 |
| ProductVersion | 1.9.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| FileDescription | fury.sp |
| FileVersion (#2) | 1.9 |
| InternalName | fury.sp.exe |
| LegalCopyright | |
| OriginalFilename | fury.sp.exe |
| ProductVersion (#2) | 1.9 |
| Assembly Version | 1.9.0.0 |
| Resource LangID | UNKNOWN |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2021-Nov-26 10:08:37 |
| Version | 0.0 |
| SizeofData | 284 |
| AddressOfRawData | 0x2d85ec |
| PointerToRawData | 0x2d67ec |
| Referenced File | c:\Users\SS COmputer\AppData\Local\Temp\bin_copy\obj\Debug\fury.sp.pdb |
No comments yet.