| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2025-Jun-25 09:36:53 |
| TLS Callbacks | 2 callback(s) detected. |
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to SHA256
Uses constants related to AES Uses constants related to Blowfish |
| Suspicious | The PE is possibly packed. | Unusual section name found: .xdata |
| Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
| Suspicious | The PE is possibly a dropper. |
Resource 27 is possibly compressed or encrypted.
Resources amount for 97.8088% of the executable. |
| Malicious | VirusTotal score: 25/66 (Scanned on 2026-03-02 05:10:50) |
APEX:
Malicious
CAT-QuickHeal: Trojan.Multi CTX: exe.trojan.multi CrowdStrike: win/malicious_confidence_90% (W) Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS Elastic: malicious (high confidence) Fortinet: W32/PossibleThreat Google: Detected Gridinsoft: Trojan.Win64.Agent.oa!s1 Ikarus: Trojan.Win64.Agent Jiangmin: Trojan.Redcap.de Kaspersky: UDS:DangerousObject.Multi.Generic Lionic: Trojan.Win32.Generic.4!c MaxSecure: Trojan.Malware.324995110.susgen McAfeeD: Trojan:Win/Wacapew.FOA Microsoft: Trojan:Win32/Wacatac.B!ml Paloalto: generic.ml Panda: Trj/GdSda.A SentinelOne: Static AI - Malicious PE Symantec: ML.Attribute.HighConfidence Trapmine: malicious.moderate.ml.score Varist: W64/ABlTrojan.BIAE-7040 Zillya: Trojan.Encoder.Win32.4547 alibabacloud: Software:Multi/Wacatac.C9nj |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 12 |
| TimeDateStamp | 2025-Jun-25 09:36:53 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 2.0 |
| SizeOfCode | 0x1f400 |
| SizeOfInitializedData | 0x6b2e00 |
| SizeOfUninitializedData | 0x27e00 |
| AddressOfEntryPoint | 0x00000000000010F6 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 5.2 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x6e2000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x2bfa7 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
|
| SizeofStackReserve | 0x200000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.dll |
AddDllDirectory
CloseHandle CopyFileW CreateDirectoryW CreateFileMappingW CreateFileW CreateProcessW DeleteCriticalSection DeleteFileW EnterCriticalSection FindResourceA FormatMessageA FreeLibrary GenerateConsoleCtrlEvent GetCommandLineW GetCurrentProcessId GetEnvironmentVariableW GetExitCodeProcess GetFileAttributesW GetFileSize GetLastError GetModuleFileNameW GetModuleHandleA GetModuleHandleExA GetProcAddress GetProcessId GetShortPathNameW GetStartupInfoW GetStdHandle GetSystemTimeAsFileTime GetTempPathW InitializeCriticalSection IsDBCSLeadByteEx K32GetModuleFileNameExW LeaveCriticalSection LoadLibraryA LoadLibraryExW LoadResource LockResource MapViewOfFile MultiByteToWideChar OpenProcess ReadFile SetConsoleCtrlHandler SetEnvironmentVariableW SetUnhandledExceptionFilter SizeofResource Sleep TerminateProcess TlsGetValue UnmapViewOfFile VirtualProtect VirtualQuery WaitForSingleObject WideCharToMultiByte WriteFile |
|---|---|
| msvcrt.dll |
__C_specific_handler
___lc_codepage_func ___mb_cur_max_func __argc __iob_func __set_app_type __setusermatherr __wargv __wgetmainargs __winitenv _amsg_exit _cexit _commode _errno _fmode _initterm _lock _onexit _unlock _wcmdln _wcsdup _wcsicmp _wrename abort calloc exit fwprintf fprintf fputc fputwc free fwrite iswctype localeconv malloc mbstowcs memcpy memmove memset puts signal strerror strlen strncmp vfprintf wcschr wcscmp wcslen wcsncmp wcstoul |
| SHELL32.dll |
CommandLineToArgvW
SHFileOperationW SHGetFolderPathW |
| StartAddressOfRawData | 0x140052000 |
|---|---|
| EndAddressOfRawData | 0x140052008 |
| AddressOfIndex | 0x14004f1c0 |
| AddressOfCallbacks | 0x140051038 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_TYPE_REG
|
| Callbacks |
0x0000000140015A40
0x0000000140015B00 |
No comments yet.