Architecture |
IMAGE_FILE_MACHINE_AMD64
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2018-Apr-16 21:59:10 |
Info | Cryptographic algorithms detected in the binary: |
Uses constants related to CRC32
Microsoft's Cryptography API |
Suspicious | The PE is possibly packed. | Unusual section name found: .didata |
Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
Malicious | VirusTotal score: 37/72 (Scanned on 2024-02-23 00:17:03) |
ALYac:
Application.Generic.3572878
AVG: FileRepMalware [Misc] Arcabit: Application.Generic.D36848E Avast: FileRepMalware [Misc] BitDefender: Application.Generic.3572878 Bkav: W64.AIDetectMalware Cylance: unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS ESET-NOD32: a variant of Win64/HackTool.Loader.B potentially unsafe Elastic: malicious (moderate confidence) Emsisoft: Application.Generic.3572878 (B) FireEye: Application.Generic.3572878 Fortinet: Riskware/Loader GData: Application.Generic.3572878 Google: Detected Gridinsoft: Trojan.Win64.Zpevdo.dd!s1 Ikarus: PUA.HackTool.Loader K7AntiVirus: Unwanted-Program ( 005956cd1 ) K7GW: Unwanted-Program ( 005956cd1 ) Lionic: Hacktool.Win32.Loader.3!c MAX: malware (ai score=72) Malwarebytes: HackTool.Loader MaxSecure: Trojan.Malware.230155059.susgen McAfee: RDN/Generic PUP.z MicroWorld-eScan: Application.Generic.3572878 Microsoft: PUA:Win32/Puwaders.C!ml Rising: Hacktool.Loader!8.1EA2 (CLOUD) Sangfor: Hacktool.Win32.Loader.V93i Skyhigh: BehavesLike.Win64.Injector.cm Sophos: Generic Reputation PUA (PUA) Symantec: ML.Attribute.HighConfidence TrendMicro-HouseCall: TROJ_GEN.R002H06LU23 VIPRE: Application.Generic.3572878 Varist: W64/ABRisk.SQVH-3000 Webroot: W32.Malware.Gen Zillya: Tool.Loader.Win64.3 |
e_magic | MZ |
---|---|
e_cblp | 0x50 |
e_cp | 0x2 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0xf |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0x1a |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x100 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_AMD64
|
NumberofSections | 11 |
TimeDateStamp | 2018-Apr-16 21:59:10 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xf0 |
Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
Magic | PE32+ |
---|---|
LinkerVersion | 8.2 |
SizeOfCode | 0x25200 |
SizeOfInitializedData | 0xb000 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x0000000000022120 (Section: .text) |
BaseOfCode | 0x1000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 5.2 |
ImageVersion | 5.2 |
SubsystemVersion | 5.2 |
Win32VersionValue | 0 |
SizeOfImage | 0x3f000 |
SizeOfHeaders | 0x400 |
Checksum | 0x39829 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x4000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x2000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
kernel32.dll |
SetFileAttributesW
GetFileType RtlUnwindEx GetACP SetFilePointer LoadResource CloseHandle LocalFree SizeofResource VirtualProtectEx GetTickCount ReadProcessMemory GetFullPathNameA GetThreadContext SetThreadContext VirtualFree GetFileSize GetStartupInfoW ExitProcess InitializeCriticalSection ContinueDebugEvent GetCurrentProcess VirtualAlloc WriteProcessMemory RtlUnwind GetTempPathW GetCommandLineW GetSystemInfo GetProcAddress GetStdHandle GetVersionExA GetVersionExW GetModuleHandleW FreeLibrary GetWindowsDirectoryW ReadFile FindFirstFileW CreateProcessW GetConsoleOutputCP UnmapViewOfFile GetConsoleCP GetLastError GetModuleFileNameW FindResourceW CompareStringW SetEndOfFile WideCharToMultiByte MapViewOfFile FindClose MultiByteToWideChar LoadLibraryW LoadLibraryA MulDiv WaitForDebugEvent CreateFileW FreeResource GetVersion RaiseException IsDBCSLeadByteEx OpenProcess SwitchToThread WriteFile CreateFileMappingW OpenThread DeleteCriticalSection TlsGetValue ExpandEnvironmentStringsW TlsSetValue LockResource LocalAlloc GetCurrentThreadId UnhandledExceptionFilter VirtualQuery Sleep SetThreadLocale |
---|---|
shell32.dll |
SHGetSpecialFolderLocation
SHGetPathFromIDListW |
psapi.dll |
GetMappedFileNameA
|
ole32.dll |
CoTaskMemFree
|
version.dll |
GetFileVersionInfoSizeW
VerQueryValueW GetFileVersionInfoW |
user32.dll |
UnregisterClassW
MoveWindow CreateWindowExW SendMessageW TranslateMessage PeekMessageW LoadIconW GetActiveWindow GetSystemMetrics DefWindowProcW MessageBoxA MessageBoxW GetWindowTextW GetWindowTextLengthW EnableWindow DestroyWindow RegisterClassW DispatchMessageW |
oleaut32.dll |
SysAllocStringLen
SysFreeString SysReAllocStringLen |
advapi32.dll |
RegSetValueExW
RegConnectRegistryW GetUserNameA CryptDestroyHash RegQueryInfoKeyW RegUnLoadKeyW CryptReleaseContext CryptGetHashParam RegSaveKeyW RegReplaceKeyW RegCreateKeyExW CryptAcquireContextA RegEnumKeyExW RegLoadKeyW AdjustTokenPrivileges RegDeleteKeyW LookupPrivilegeValueW RegOpenKeyExW OpenProcessToken FreeSid AllocateAndInitializeSid RegDeleteValueW RegFlushKey RegEnumValueW RegQueryValueExW CryptHashData RegCloseKey CryptCreateHash RegRestoreKeyW |
gdi32.dll |
CreateFontW
GetTextExtentPoint32W RestoreDC DeleteObject SelectObject DeleteDC SaveDC GetTextExtentPointW CreateCompatibleDC |
ntdll.dll |
NtQueryInformationProcess
|
kernel32.dll (delay-loaded) |
SetFileAttributesW
GetFileType RtlUnwindEx GetACP SetFilePointer LoadResource CloseHandle LocalFree SizeofResource VirtualProtectEx GetTickCount ReadProcessMemory GetFullPathNameA GetThreadContext SetThreadContext VirtualFree GetFileSize GetStartupInfoW ExitProcess InitializeCriticalSection ContinueDebugEvent GetCurrentProcess VirtualAlloc WriteProcessMemory RtlUnwind GetTempPathW GetCommandLineW GetSystemInfo GetProcAddress GetStdHandle GetVersionExA GetVersionExW GetModuleHandleW FreeLibrary GetWindowsDirectoryW ReadFile FindFirstFileW CreateProcessW GetConsoleOutputCP UnmapViewOfFile GetConsoleCP GetLastError GetModuleFileNameW FindResourceW CompareStringW SetEndOfFile WideCharToMultiByte MapViewOfFile FindClose MultiByteToWideChar LoadLibraryW LoadLibraryA MulDiv WaitForDebugEvent CreateFileW FreeResource GetVersion RaiseException IsDBCSLeadByteEx OpenProcess SwitchToThread WriteFile CreateFileMappingW OpenThread DeleteCriticalSection TlsGetValue ExpandEnvironmentStringsW TlsSetValue LockResource LocalAlloc GetCurrentThreadId UnhandledExceptionFilter VirtualQuery Sleep SetThreadLocale |
Attributes | 0x1 |
---|---|
Name | kernel32.dll |
ModuleHandle | 0x34080 |
DelayImportAddressTable | 0x340a0 |
DelayImportNameTable | 0x340e8 |
BoundDelayImportTable | 0x34130 |
UnloadDelayImportTable | 0x34160 |
TimeStamp | 1970-Jan-01 00:00:00 |
Ordinal | 1 |
---|---|
Address | 0x311c0 |
Ordinal | 2 |
---|---|
Address | 0x10440 |
StartAddressOfRawData | 0x436000 |
---|---|
EndAddressOfRawData | 0x436224 |
AddressOfIndex | 0x4291a0 |
AddressOfCallbacks | 0x437020 |
SizeOfZeroFill | 0 |
Characteristics |
IMAGE_SCN_TYPE_REG
|
Callbacks | (EMPTY) |