f5a14027d4126aa7a8caeddd45c45f70

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2016-Nov-21 11:44:17

Plugin Output

Info Matching compiler(s): .NET executable -> Microsoft
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to internet browsers:
  • chrome.exe
Suspicious The PE is possibly packed. The PE only has 0 import(s).
Suspicious The file contains overlay data. 23552 bytes of data starting at offset 0x18400.
Malicious VirusTotal score: 13/70 (Scanned on 2019-05-14 20:09:40) Comodo: Heur.Corrupt.PE@1z141z3
Invincea: heuristic
Trapmine: malicious.moderate.ml.score
FireEye: Generic.mg.f5a14027d4126aa7
TheHacker: W32/Behav-Heuristic-CorruptFile-EP
SentinelOne: DFI - Malicious PE
Microsoft: Backdoor:MSIL/Ploutos.B!bit
GData: MSIL.Backdoor.Proteus.A
Acronis: suspicious
Rising: Backdoor.Bladabindi!8.B1F/N3#85% (RDM+:cmRtazrFAhP9cVDYtxzWUflOhQss)
eGambit: Unsafe.AI_Score_100%
Cybereason: malicious.df8980
CrowdStrike: win/malicious_confidence_100% (D)

Hashes

MD5 f5a14027d4126aa7a8caeddd45c45f70
SHA1 bdf8257df8980f3d3f253f39d07b10c66a5392a9
SHA256 7001126a545bbe8efa2ccdc69c17c9c7749266df5fa734e2c8f3befff4dc3e1a
SHA3 6c28413bd5de4b57a37fcc9d66af9eb418adc37da1164ff2fe9f910a4ff77d12
SSDeep 3072:l5+L8kj/tUdXDaAkmvb5hdVAupFVZWIfgaw:lytUdXDaA1T1V3
Imports Hash d41d8cd98f00b204e9800998ecf8427e

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2016-Nov-21 11:44:17
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x17a00
SizeOfInitializedData 0x800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x71BE7CEF (Section: ?)
BaseOfCode 0x2000
BaseOfData 0x1a000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x1e000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 d54caf881e16992778e19a521d97e7aa
SHA1 50725b898bf674cb1117b52a9dbe4d632cbeda79
SHA256 f2248ae6dbd34c7891c87c76873181b45445d7d87e10775b62360299c73202b4
SHA3 fc327ce555e12d0d2eb4c38fb9f51d606de3d6961689201eedbdc22a0fdfe9cb
VirtualSize 0x17908
VirtualAddress 0x2000
SizeOfRawData 0x17a00
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.17873

.rsrc

MD5 5835be8bf4290e6df42994c793aed504
SHA1 c041cac284e7410904c92c9fbf2491ceb1a7f5dc
SHA256 08d62347aa7becfc1c1c3a5f1e2a855e433f3194f55a508c1595cba77aa717cd
SHA3 4564603e625a207f800d21efd2fd9751d03b06e9fad6cecfd9efe9dc083d4f50
VirtualSize 0x5f4
VirtualAddress 0x1a000
SizeOfRawData 0x600
PointerToRawData 0x17c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.65232

.reloc

MD5 30375602871500b32335cf6e3f5aaf56
SHA1 6ed7410b5a9a9a1acfa747bde38ba00b399b7db4
SHA256 90a81b744f73ceb810b061f111d5f1722c14bbe8e423dfee679c598f9b0340a6
SHA3 f2f635e7f880751a87f9c4cbba10d9e5cf2a603a6c1bc168bbfd3beaf17d98fc
VirtualSize 0xc
VirtualAddress 0x1c000
SizeOfRawData 0x200
PointerToRawData 0x18200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 3.53253

Imports

Delayed Imports

Version Info

TLS Callbacks

Load Configuration

RICH Header

Errors

[!] Error: Could not read an import's name. [!] Error: The PE's resource section is invalid or has been manually modified. Resources will not be parsed.