5025b675342dcf6be97158b67c2bd9e8961b7c6c50b484b80b6bbe30a6183d9c

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2024-Apr-16 12:55:11
Detected languages English - United States

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: .mrj0
Unusual section name found: .mrj1
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Can access the registry:
  • RegQueryValueExA
Possibly launches other programs:
  • ShellExecuteA
Malicious VirusTotal score: 28/71 (Scanned on 2025-06-02 09:20:08) APEX: Malicious
Alibaba: Trojan:Application/VMProtBad.1a9ed970
Antiy-AVL: RiskWare[Packed]/Win32.VMProtect.a
CAT-QuickHeal: Trojan.Ghanarava.1730429216427e8c
CTX: dll.trojan.vmprotbad
CrowdStrike: win/malicious_confidence_90% (W)
Cylance: Unsafe
Cynet: Malicious (score: 100)
DeepInstinct: MALICIOUS
Elastic: malicious (high confidence)
Fortinet: W32/PossibleThreat
Google: Detected
Gridinsoft: Trojan.Heur!.02296020
K7AntiVirus: Trojan ( 7000001c1 )
K7GW: Trojan ( 7000001c1 )
Lionic: Trojan.Win32.VMProtBad.4!c
Malwarebytes: Malware.Heuristic.2027
MaxSecure: Trojan.Malware.300983.susgen
McAfeeD: Real Protect-LS!CA1C1C6792DE
Microsoft: Trojan:Win32/Kepavll!rfn
Paloalto: generic.ml
Sangfor: Suspicious.Win32.Save.a
SentinelOne: Static AI - Malicious PE
Skyhigh: BehavesLike.Win32.Backdoor.tc
Sophos: Mal/VMProtBad-A
TrellixENS: Artemis!CA1C1C6792DE
ZoneAlarm: Mal/VMProtBad-A
tehtris: Generic.Malware

Hashes

MD5 ca1c1c6792de6043ac056fabed427e8c
SHA1 e12f7bc8a75a6af1490225b216b6096d7ca14752
SHA256 5025b675342dcf6be97158b67c2bd9e8961b7c6c50b484b80b6bbe30a6183d9c
SHA3 4f871795f37c37e0743de5707daedafd1cd72dce605ebc4ceced092a3ac110bb
SSDeep 98304:HbqWeH6ZBWnHjYOYHhrF++/6PwqfMWYPFZTm/dZtU6k9PDG7hqzvp7Pf:7OHwMnDYOYHH/6BMWY9U/dxkEtc
Imports Hash e13659d3fca8065d391f02293943b893

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 7
TimeDateStamp 2024-Apr-16 12:55:11
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 14.0
SizeOfCode 0x6400
SizeOfInitializedData 0x4200
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00342795 (Section: .mrj1)
BaseOfCode 0x1000
BaseOfData 0x8000
ImageBase 0x10000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x88c000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x63c1
VirtualAddress 0x1000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ

.rdata

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x2a02
VirtualAddress 0x8000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.data

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0xa28
VirtualAddress 0xb000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.mrj0

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x329430
VirtualAddress 0xc000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ

.mrj1

MD5 bdae7244f7e68a0c4ca6ebdffae90117
SHA1 f0e014a894cf2748abb9589e686cbc8229d90e11
SHA256 5dc1ee42f0db403dfb0da4eecef4319377edfb6fc93be193058e70ef91af2e37
SHA3 d132f5877904dd4b0f8752274e2354ac85d40646ba32094c85a27cca14474a96
VirtualSize 0x553b50
VirtualAddress 0x336000
SizeOfRawData 0x553c00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.95668

.reloc

MD5 d11d4e2b0a3586dc7f8c4671e8dc432b
SHA1 5e35301ac11deed81f0f089800abcb39c8c1db35
SHA256 b7bcc6d904fa98342a490b7f93c3976986e27ce7e08900ba2de74d4b64af3c70
SHA3 8f3035aebf67d36033b85836175f1a08e771c355108abdd3c6b7868dcf7490bf
VirtualSize 0x594
VirtualAddress 0x88a000
SizeOfRawData 0x600
PointerToRawData 0x554000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.22455

.rsrc

MD5 ca9236049582e0d49af4dc1ebe8c72f3
SHA1 c43419abf58fe0096633892697b4279fde0398a0
SHA256 63bc1683dec81dd6f434346f7e7f7782f013ac94fce61c437fd9e18ad71deb1f
SHA3 0ea7b1f8abcd829464434847724f7e413f5c05cf7aad1251ae9c791974ddc5f0
VirtualSize 0xe9
VirtualAddress 0x88b000
SizeOfRawData 0x200
PointerToRawData 0x554600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.5313

Imports

KERNEL32.dll VirtualQuery
ADVAPI32.dll RegQueryValueExA
SHELL32.dll ShellExecuteA
MSVCP140.dll ?always_noconv@codecvt_base@std@@QBE_NXZ
VCRUNTIME140.dll _CxxThrowException
api-ms-win-crt-stdio-l1-1-0.dll setvbuf
api-ms-win-crt-heap-l1-1-0.dll free
api-ms-win-crt-runtime-l1-1-0.dll _initialize_onexit_table
api-ms-win-crt-filesystem-l1-1-0.dll _lock_file
api-ms-win-crt-environment-l1-1-0.dll getenv
api-ms-win-crt-locale-l1-1-0.dll ___lc_codepage_func
WTSAPI32.dll WTSSendMessageW
KERNEL32.dll (#2) VirtualQuery
USER32.dll GetProcessWindowStation
KERNEL32.dll (#3) VirtualQuery
USER32.dll (#2) GetProcessWindowStation

Delayed Imports

2

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x91
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.8858
MD5 f7ad1eab748bc07570a57ec87787cf90
SHA1 0b1608da9fef218386e825db575c65616826d9f4
SHA256 d2952e57023848a37fb0f21f0dfb38c9000f610ac2b00c2f128511dfd68bde04
SHA3 6c9541b36948c19ae507d74223621875b3af4064f7cd8200bdb97e15a047e96a

Version Info

TLS Callbacks

Load Configuration

Size 0xbc
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1000b00c
SEHandlerTable 0x10889a00
SEHandlerCount 82

RICH Header

Errors

[!] Error: Could not read the exported DLL name. [!] Error: Could not reach the TLS callback table. [*] Warning: Section .text has a size of 0! [*] Warning: Section .rdata has a size of 0! [*] Warning: Section .data has a size of 0! [*] Warning: Section .mrj0 has a size of 0!
Leave a comment

No comments yet.