Architecture |
IMAGE_FILE_MACHINE_AMD64
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2021-Aug-01 04:39:37 |
Info | Cryptographic algorithms detected in the binary: | Uses constants related to CRC32 |
Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
Suspicious | The file contains overlay data. |
12794608 bytes of data starting at offset 0x53c00.
The overlay data has an entropy of 7.99843 and is possibly compressed or encrypted. Overlay data amounts for 97.3889% of the executable. |
Malicious | VirusTotal score: 31/74 (Scanned on 2024-07-14 17:48:43) |
AVG:
FileRepMalware [Misc]
AhnLab-V3: Trojan/Win.Agent.C5648656 Alibaba: TrojanPSW:Win32/Almi_LaZagne.a Antiy-AVL: HackTool/Python.Doser Avast: FileRepMalware [Misc] Avira: TR/Agent.jjmxv Bkav: W64.AIDetectMalware Cynet: Malicious (score: 99) DeepInstinct: MALICIOUS ESET-NOD32: Python/HackTool.DoSer.M F-Secure: Trojan.TR/Agent.jjmxv Fortinet: W32/DoSer.M!tr Google: Detected K7AntiVirus: Trojan ( 005b10021 ) K7GW: Trojan ( 005b10021 ) Lionic: Trojan.Win32.Bitmin.tsev Malwarebytes: Agent.Spyware.Stealer.DDS McAfee: Artemis!9D847CE73C7B McAfeeD: ti!5A000DFADC58 Microsoft: HackTool:Win64/Agent!MTB Paloalto: generic.ml Sangfor: Hacktool.Win32.Doser.V5ae Skyhigh: BehavesLike.Win64.TrojanPypykatz.rc Sophos: Mal/Generic-S Symantec: Trojan.Gen.MBT TrendMicro-HouseCall: TROJ_GEN.R002H0AAI24 Varist: W64/ABApplication.GNXM-0199 VirIT: Trojan.Win64.Genus.GYZ Webroot: W32.Malware.Gen Xcitium: Malware@#1s2h15ght67xc alibabacloud: HackTool:Python/DoSer.M |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xf8 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_AMD64
|
NumberofSections | 7 |
TimeDateStamp | 2021-Aug-01 04:39:37 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xf0 |
Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
Magic | PE32+ |
---|---|
LinkerVersion | 14.0 |
SizeOfCode | 0x23600 |
SizeOfInitializedData | 0x30200 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x0000000000009D04 (Section: .text) |
BaseOfCode | 0x1000 |
ImageBase | 0x140000000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 5.2 |
ImageVersion | 0.0 |
SubsystemVersion | 5.2 |
Win32VersionValue | 0 |
SizeOfImage | 0x68000 |
SizeOfHeaders | 0x400 |
Checksum | 0xc96f7e |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
KERNEL32.dll |
GetCommandLineW
GetEnvironmentVariableW SetEnvironmentVariableW ExpandEnvironmentStringsW CreateDirectoryW GetTempPathW WaitForSingleObject Sleep GetExitCodeProcess CreateProcessW FreeLibrary LoadLibraryExW CloseHandle GetCurrentProcess LoadLibraryA LocalFree FormatMessageW MultiByteToWideChar WideCharToMultiByte SetEndOfFile GetProcAddress GetModuleFileNameW SetDllDirectoryW GetStartupInfoW GetLastError RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind UnhandledExceptionFilter SetUnhandledExceptionFilter TerminateProcess IsProcessorFeaturePresent QueryPerformanceCounter GetCurrentProcessId GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead IsDebuggerPresent GetModuleHandleW RtlUnwindEx SetLastError EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree RaiseException GetCommandLineA ReadFile CreateFileW GetDriveTypeW GetFileInformationByHandle GetFileType PeekNamedPipe SystemTimeToTzSpecificLocalTime FileTimeToSystemTime GetFullPathNameW RemoveDirectoryW FindClose FindFirstFileExW FindNextFileW SetStdHandle SetConsoleCtrlHandler DeleteFileW GetStdHandle WriteFile ExitProcess GetModuleHandleExW HeapFree GetConsoleMode ReadConsoleW SetFilePointerEx GetConsoleOutputCP GetFileSizeEx HeapAlloc CompareStringW LCMapStringW GetCurrentDirectoryW FlushFileBuffers GetFileAttributesExW IsValidCodePage GetACP GetOEMCP GetCPInfo GetEnvironmentStringsW FreeEnvironmentStringsW GetStringTypeW GetProcessHeap GetTimeZoneInformation HeapSize HeapReAlloc WriteConsoleW |
---|---|
ADVAPI32.dll |
ConvertSidToStringSidW
GetTokenInformation OpenProcessToken ConvertStringSecurityDescriptorToSecurityDescriptorW |
Characteristics |
0
|
---|---|
TimeDateStamp | 2021-Aug-01 04:39:37 |
Version | 0.0 |
SizeofData | 656 |
AddressOfRawData | 0x33980 |
PointerToRawData | 0x32380 |
Size | 0x138 |
---|---|
TimeDateStamp | 1970-Jan-01 00:00:00 |
Version | 0.0 |
GlobalFlagsClear | (EMPTY) |
GlobalFlagsSet | (EMPTY) |
CriticalSectionDefaultTimeout | 0 |
DeCommitFreeBlockThreshold | 0 |
DeCommitTotalFreeThreshold | 0 |
LockPrefixTable | 0 |
MaximumAllocationSize | 0 |
VirtualMemoryThreshold | 0 |
ProcessAffinityMask | 0 |
ProcessHeapFlags | (EMPTY) |
CSDVersion | 0 |
Reserved1 | 0 |
EditList | 0 |
SecurityCookie | 0x140037018 |
XOR Key | 0x584622d4 |
---|---|
Unmarked objects | 0 |
C objects (27412) | 11 |
ASM objects (27412) | 7 |
C++ objects (27412) | 185 |
253 (28518) | 3 |
C++ objects (VS 2015/2017/2019 runtime 29913) | 38 |
C objects (VS 2015/2017/2019 runtime 29913) | 17 |
ASM objects (VS 2015/2017/2019 runtime 29913) | 9 |
Imports (27412) | 5 |
Total imports | 114 |
C objects (VS2019 Update 9 (16.9.4) compiler 29914) | 19 |
Linker (VS2019 Update 9 (16.9.4) compiler 29914) | 1 |