b4d3cd8baed18a6d566f98c37d5a9467

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2020-Jan-27 20:40:50
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
CompanyName
FileVersion
FileDescription Paranoid Fish is paranoid
InternalName
LegalCopyright
LegalTrademarks
OriginalFilename
ProductName Paranoid Fish
ProductVersion

Plugin Output

Suspicious PEiD Signature: UPX -> www.upx.sourceforge.net
UPX 2.00-3.0X -> Markus Oberhumer & Laszlo Molnar & John Reiser
Suspicious The PE is packed with UPX Unusual section name found: UPF0
Section UPF0 is both writable and executable.
Unusual section name found: UPX1
Section UPX1 is both writable and executable.
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • FindWindowA
Can access the registry:
  • RegCloseKey
Leverages the raw socket API to access the Internet:
  • getaddrinfo
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 b4d3cd8baed18a6d566f98c37d5a9467
SHA1 1b9cfc4b538d73440047834079812e3f46bb28c3
SHA256 10364d12dca8ec1552965c3cbbd7b94cdb7c109b3141d2b237017abb1c831d9a
SHA3 03660afda0073c318af058ab6db3207e0731941d77379d8d5263068331436f5f
SSDeep 1536:iIwWrEy6fuGNjppJyrOM1GhFNkYU2BxNgrSW:6aEy6WGvyrOMGTkoNgr7
Imports Hash 29a9da0d564710c0a8394b77775a1b10

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2020-Jan-27 20:40:50
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x4000
SizeOfInitializedData 0xa000
SizeOfUninitializedData 0x16000
AddressOfEntryPoint 0x0001A580 (Section: UPX1)
BaseOfCode 0x17000
BaseOfData 0x1b000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 1.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x25000
SizeOfHeaders 0x1000
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
SizeofStackReserve 0x200000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

UPF0

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x16000
VirtualAddress 0x1000
SizeOfRawData 0
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

UPX1

MD5 d86c784d6bc57ba867cf454da6a739bf
SHA1 9b725b1ce90c7786256de9d377d93d8eff6d2179
SHA256 b9c18f92ded58e0093c0284d86502a48806cf72fb9be3ec90472110f62eb5204
SHA3 d30f50f4f8bfb284aeebbf51cd717f83cc6ca077e981a65029153ddae420a405
VirtualSize 0x4000
VirtualAddress 0x17000
SizeOfRawData 0x3800
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.82303

.rsrc

MD5 578e8bdacc35ade872f525cea22566e8
SHA1 a9ea622394195ee504653de4f5461e154a6cbed3
SHA256 9434e2b0d4a5cf62b75ddd57ce05733b5c1a84e5fd3c26fa867662d0cf3cc433
SHA3 c71ec03ac8c41fa949ee6b2e519cc7b6496f2d638f5fedcb2b229f78262c8808
VirtualSize 0xa000
VirtualAddress 0x1b000
SizeOfRawData 0x9800
PointerToRawData 0x3a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.81596

Imports

ADVAPI32.dll RegCloseKey
IPHLPAPI.DLL GetAdaptersAddresses
KERNEL32.DLL LoadLibraryA
ExitProcess
GetProcAddress
VirtualProtect
MPR.DLL WNetGetProviderNameA
msvcrt.dll _iob
ole32.dll CoInitializeEx
OLEAUT32.dll SysFreeString
SHELL32.dll ShellExecuteExW
USER32.dll FindWindowA
WS2_32.dll getaddrinfo

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a6c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.91525
Detected Filetype PNG graphic file
MD5 50a9b70330d4c9770ddbfc114a470393
SHA1 9d10e2e892fd4cecebd3d4e3cc0e02593f986a93
SHA256 a4241efc26682836a65f0f006b78c251ff407d41fc40617b1dffad2173cf054f
SHA3 5fc938fa7d332e47ef7cfb386f941121a3d1a2ee10793f531ed702c4dd60e17e

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1e12
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.92568
Detected Filetype PNG graphic file
MD5 92b50b5af9a20566c078c87fa2c8abb1
SHA1 e15925db93934112ec527e81762e51153c3b4cd3
SHA256 2eaf3b7d550282b5f1c039dad0a5e291b3fa1caa43f74433dde9264212388280
SHA3 20a18e9f93f2f8ac655d25520aee23f94bf1826379190fe1f52539006237afd8

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x79e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.84982
Detected Filetype PNG graphic file
MD5 f8572abdedcd787fa5d734187059eafa
SHA1 48c1086207cb50c83db9ac72a1dcd6f53b39fd71
SHA256 234e6d565baaf4c43d7a36ba99b1f296de2d0bba1a48b97a96dda24b73a1701c
SHA3 8ad9afc9a9df90bae8b55381416180068e0dc0462d9711ac57ca1c1358043efe

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4ac
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.78717
Detected Filetype PNG graphic file
MD5 6413fac6c5a51dbd6a5f532074fd2389
SHA1 adb70b9e80073999494028287b99ee53a8548ac5
SHA256 686ea3b73c6520c38a8c399aec063391b5ed15dfc1c95442931a07b492b0a7aa
SHA3 0e75ac2bdb864dee729bf99512f5465c534633092b43a37e324e977d54b22ab8

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x354
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.68879
Detected Filetype PNG graphic file
MD5 ff6846f06399f549e6443052c3db7dcd
SHA1 3fd9fe91c888150509eb8155eecc5d583a63beb0
SHA256 9596025745330d9d9b63be666ed7ed2db55c71ab6be0da76d6f0bf57249bfbdb
SHA3 6a53b15907a5511405d38acc267e1116abac43532d852a03348f8bdd6aa61b21

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1f1
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.41808
Detected Filetype PNG graphic file
MD5 87c735a12a02cfea200e24fdbb0cc9f9
SHA1 adebe77ca865630338bb9919e00b6d61597456a5
SHA256 520ca0f0f2bc979bde1cf0944da37aa5ef4fb2cd493a94d98506aa56c1f98553
SHA3 7830efdd7bf3b2f6408dae8daf3c932e9e7a18ae980d2245a8cc7c7e7056e360

A

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.99178
Detected Filetype Icon file
MD5 60ae129a955f853471899e9f7ac97fbf
SHA1 f918b7a57887c4dbc9e1f5a6628c222c4627fec2
SHA256 d124b8c6d80c0d4bf86bc6ee14cb849d21efe510534e659239f7e6b8e3bb9f63
SHA3 93476e8f2cc02abedcd98ad8eb3f1af18d1236fcdc8d916ac306280e25c7e722

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x288
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.13852
MD5 6b306dd7205d605fd85323c77bb8d508
SHA1 c15f6b5a93fbcfa0cbbac7f483ca57d649c31e42
SHA256 a31244099abcf866e9178d19745c1da61158028570bc84b3ec87dd5a52a84543
SHA3 4ba6ecdb95c9a84a1a458b415bb78290131e4e7b3d37ad7ee6a0ec86f7b0f628

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x48f
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.13793
MD5 5aa04ce935e78505e230765e85c34355
SHA1 6c93b8c5fde8be4b2231dca6b8ec513cdc82c991
SHA256 a73f26a8d504043f785d7360e8febf2eeb8522ec873a0d4dd5d1d4bfd1e67d3d
SHA3 149467cafc03ba34b33cd8076fc2771413760822357952de205dbae2b5cb8059

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 0.5.8.1
ProductVersion 0.5.8.1
FileFlags (EMPTY)
FileOs (EMPTY)
FileType VFT_APP
Language English - United States
CompanyName
FileVersion (#2)
FileDescription Paranoid Fish is paranoid
InternalName
LegalCopyright
LegalTrademarks
OriginalFilename
ProductName Paranoid Fish
ProductVersion (#2)
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x41a760
EndAddressOfRawData 0x41a764
AddressOfIndex 0x40b390
AddressOfCallbacks 0x41a764
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks 0x0041A728

Load Configuration

RICH Header

Errors

[*] Warning: Section UPF0 has a size of 0!