dcb5489a8103333d3e9ac705ab382d69

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2020-Aug-08 12:29:54

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryExW
  • LoadLibraryA
Possibly launches other programs:
  • CreateProcessW
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Leverages the raw socket API to access the Internet:
  • ntohl
Enumerates local disk drives:
  • GetDriveTypeW
Suspicious The file contains overlay data. 26688053 bytes of data starting at offset 0x2d200.
The overlay data has an entropy of 7.99823 and is possibly compressed or encrypted.
Overlay data amounts for 99.3122% of the executable.
Malicious VirusTotal score: 11/69 (Scanned on 2021-07-20 16:16:30) Cylance: Unsafe
ESET-NOD32: Python/PSW.Agent.CV
APEX: Malicious
Kaspersky: HEUR:Trojan-PSW.Python.Disco.gen
Rising: Trojan.Generic@ML.84 (RDML:OehLDaUMmZ5Agf5ahZ9TRg)
Sophos: Generic ML PUA (PUA)
Microsoft: Program:Win32/Wacapew.C!ml
ZoneAlarm: HEUR:Trojan-PSW.Python.Disco.gen
eGambit: Unsafe.AI_Score_97%
Fortinet: Python/Agent.CV!tr.pws
MaxSecure: Win.MxResIcn.Heur.Gen

Hashes

MD5 dcb5489a8103333d3e9ac705ab382d69
SHA1 236e90bb3b7bcda0b9b963f159b19699f8accc44
SHA256 e52bba1bcbbb4391cb796fcff92617ea789c129b238de9fdd7c9459567698cc1
SHA3 499f83c1dd34bcfc895f4f1894e8e5c9a2dc6bc1fc5a0dc447c5e09d99bae947
SSDeep 786432:CqYEF/2Xa44+yNClnterB7PU0GAoFe3mK8z:ZJEapwB4rB4nA93m
Imports Hash 8a8e6ec4905731eb869f3d5f746037d6

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 6
TimeDateStamp 2020-Aug-08 12:29:54
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 14.0
SizeOfCode 0x1f400
SizeOfInitializedData 0xda00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000781A (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x21000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.1
ImageVersion 0.0
SubsystemVersion 5.1
Win32VersionValue 0
SizeOfImage 0x3c000
SizeOfHeaders 0x400
Checksum 0x19a3981
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 1522d1c95fec43c1d9818d4a9c494f7f
SHA1 3ed1db899bb1d565fbcc9c8a8d3774c8bc11c24a
SHA256 2c5f6206e41d0b5bff11ddf410739b49bef13f4bb061cdb5330f1930ccdcc2c4
SHA3 dc1ca58e43448517f166345d5ad57ccf9b62a3030c33e2ceeb0669430a44f50e
VirtualSize 0x1f274
VirtualAddress 0x1000
SizeOfRawData 0x1f400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.65656

.rdata

MD5 618e8f1451feb3f5fd96b1fbc52f5804
SHA1 a5db341d216fdd43a19c3ba102562d8e23609eb7
SHA256 bd94920014658ce1c355a1d2e0db4ee3bb3811bbe24aa0aa226945cc98ba8db4
SHA3 79a7324f8cb94c7b1ee2a5487ebe9aa1f918c09d61942012e14fbc9cd193cbb1
VirtualSize 0xb386
VirtualAddress 0x21000
SizeOfRawData 0xb400
PointerToRawData 0x1f800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.1121

.data

MD5 d794b133cf186f226154b8bc7907461c
SHA1 2261a833ab0145a1ade3fce24102419fc1a304bc
SHA256 ff533f48dcd7494e9b154ad3444b607a0044164a53f8e294e3ae3831f4cfcdb1
SHA3 80815b7c565baf0f1d4d2ae17ecbe57b0d7113b03dd9e7719b4f8279eedf166f
VirtualSize 0xa668
VirtualAddress 0x2d000
SizeOfRawData 0xa00
PointerToRawData 0x2ac00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 1.93189

.gfids

MD5 e86fe483a6c2ceb984f295006933d13e
SHA1 4d39fe9b93d0f373c3ce8941d3646aa6f10c104f
SHA256 c68fc2468322d854e4d2ef69874d47e50bb3c5622e075d1e2bf6e5d05a87b676
SHA3 43845c7c724355b1b5063fb5585536500fc6cb17a53fd3334f0dcde41718723c
VirtualSize 0xb8
VirtualAddress 0x38000
SizeOfRawData 0x200
PointerToRawData 0x2b600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.82045

.rsrc

MD5 4e3b2ec5da7200456d338156d854c01b
SHA1 14785d8c93413b8394db70afa29926e0c894c28e
SHA256 0744ca237cc3be29e5418f7aa17a84baddeed90452054635155c2258af0d40e9
SHA3 13f75ff76dff837e3519aeb5cb44eb07268ab22c8832d74aa676672ec2cea6cd
VirtualSize 0x10
VirtualAddress 0x39000
SizeOfRawData 0x200
PointerToRawData 0x2b800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.0203931

.reloc

MD5 da469132021a140020cdea30d0e6aab7
SHA1 8fd136ae2fd2455f914e37489530b01088bd2d7f
SHA256 638719fab92144df265cae82080f1fd1ebed8d1cfb76f967c713724b8657a49f
SHA3 116b36459a302dd1b78a60865793f093027a24398749575996606c52a9c1b9e7
VirtualSize 0x17fc
VirtualAddress 0x3a000
SizeOfRawData 0x1800
PointerToRawData 0x2ba00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.6693

Imports

KERNEL32.dll GetModuleFileNameW
GetProcAddress
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetTempPathW
WaitForSingleObject
SetDllDirectoryW
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
LoadLibraryExW
CreateDirectoryW
FormatMessageW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
Sleep
GetLastError
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetCommandLineA
ReadFile
CreateFileW
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameW
GetFullPathNameA
RemoveDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
SetStdHandle
SetConsoleCtrlHandler
DeleteFileW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
CompareStringW
LCMapStringW
GetCurrentDirectoryW
FlushFileBuffers
SetEnvironmentVariableA
GetFileAttributesExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetProcessHeap
WriteConsoleW
GetTimeZoneInformation
HeapSize
HeapReAlloc
SetEndOfFile
RaiseException
ADVAPI32.dll ConvertStringSecurityDescriptorToSecurityDescriptorW
WS2_32.dll ntohl

Delayed Imports

Version Info

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2020-Aug-08 12:29:54
Version 0.0
SizeofData 696
AddressOfRawData 0x2b11c
PointerToRawData 0x2991c

TLS Callbacks

Load Configuration

Size 0x5c
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x42d008
SEHandlerTable 0x42b110
SEHandlerCount 3

RICH Header

XOR Key 0x57e2ec80
Unmarked objects 0
241 (40116) 12
243 (40116) 169
242 (40116) 24
ASM objects (VS2015 UPD3 build 24123) 18
C++ objects (VS2015 UPD3 build 24123) 29
C objects (VS2015 UPD3 build 24123) 18
Imports (65501) 7
Total imports 113
C objects (VS2015 UPD3 build 24210) 16
Resource objects (VS2015 UPD3 build 24210) 1
Linker (VS2015 UPD3 build 24210) 1

Errors

<-- -->