dec760196a07bdbb5657573b64c78ef0

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2025-Dec-24 15:00:00
Detected languages English - United Kingdom

Plugin Output

Malicious The file headers were tampered with. Unusual section name found: Jule
Section Jule is both writable and executable.
Unusual section name found: mand
Section mand is both writable and executable.
The PE only has 9 import(s).
The RICH header checksum is invalid.
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress

Hashes

MD5 dec760196a07bdbb5657573b64c78ef0
SHA1 61586ddaadba60b009ba80c3bc0da55e33fa1e54
SHA256 1c5906bdc009e83b62c248a967f84b2ab1485effbe6ff0b82c7b8d9a8db0c06d
SHA3 5fbca3e803d54e6e67578a15dd8c83ca5b89979dbea3ddbb6a238ea1b8ca8649
SSDeep 12288:d4kKWf7ZZlMMmxiOcLTNiA5u758WALUZa4IH:d4kK+7ZZKMmxhqTNiguGII
Imports Hash 151468fc3400e547b218009c3489bda9

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x108

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2025-Dec-24 15:00:00
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 14.0
SizeOfCode 0x61000
SizeOfInitializedData 0x1000
SizeOfUninitializedData 0x75000
AddressOfEntryPoint 0x000D5DE0 (Section: mand)
BaseOfCode 0x76000
BaseOfData 0xd7000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xd8000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

Jule

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x75000
VirtualAddress 0x1000
SizeOfRawData 0
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

mand

MD5 eaf927bc7190cada06e8704afc157404
SHA1 16feee92f2ae809cdea9426465f27f993178abb1
SHA256 f055b3f931697731de3bca819a1b8e95e4d61f64cf8c6dc0bd1ec0e382a1cc25
SHA3 e9d1badcec8f99bccfdec97d44391faa23f7baaaf86b4ef2539b69e9a65a891d
VirtualSize 0x61000
VirtualAddress 0x76000
SizeOfRawData 0x60200
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.80135

.rsrc

MD5 ffb5b034ba0cb551ec44a80fe6bad05e
SHA1 56ce21cbec833acdc402d9195d3c044f7bf4f961
SHA256 465d3c3e221c9c648801899050209243b91233cfb5bacfbc00a469f212fe2f62
SHA3 40fe8afbbe64a44ecf0d8a650255b3e6a3827f8efefd1852ec6a08dcefea0835
VirtualSize 0x1000
VirtualAddress 0xd7000
SizeOfRawData 0x400
PointerToRawData 0x60600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.67617

Imports

GDI32.dll DeleteDC
KERNEL32.DLL LoadLibraryA
ExitProcess
GetProcAddress
VirtualProtect
ole32.dll CoCreateInstance
USER32.dll GetDC
WindowsCodecs.dll WICConvertBitmapSource
WINMM.dll waveOutOpen

Delayed Imports

104

Type PNG
Language English - United Kingdom
Codepage UNKNOWN
Size 0x4aba3
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.76525
MD5 e18d14c0a4878f37e9cd167adee68b48
SHA1 4b99cba86fb316de2f5c69b1b4ad100212768fbf
SHA256 0922fb325b2a5ac2467d1cc234713582641262ca97c70cd909e22c9d435adabe
SHA3 b1428c4ea025e4abbec6500faadc5a57a52f332d187bd880bdd022c538607ad7

109

Type TITCHYSID_LICENSE
Language English - United Kingdom
Codepage UNKNOWN
Size 0x42b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.56213
MD5 8676715920e058c5a4cdf091195f5862
SHA1 5da17c2866bbf65332bd1afe5c8fb074c0057369
SHA256 895d5bac181411561466174bc8e9f013c390a8cfed60308afad7a2dd41d34c82
SHA3 feae30d03dace5e5fa7ffa7257b1c345f73319b26efc6b2886a7eac53dbd5b10

Version Info

TLS Callbacks

Load Configuration

Size 0xc0
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x41af00
SEHandlerTable 0
SEHandlerCount 0

RICH Header

XOR Key 0xc9e10e67
Unmarked objects 0
ASM objects (33136) 12
C++ objects (33136) 142
ASM objects (33808) 19
C objects (33808) 17
C++ objects (33808) 43
C objects (33136) 20
Unmarked objects (#2) 2
Imports (33136) 13
Total imports 136
C++ objects (34120) 3
Resource objects (34120) 1
Linker (34120) 1

Errors

[*] Warning: Section Jule has a size of 0! [*] Warning: Please edit the configuration file with your VirusTotal API key. [!] Error: Could not load yara_rules/bitcoin.yara! [!] Error: Could not load yara_rules/monero.yara! [!] Error: Could not load yara_rules/findcrypt.yara! [!] Error: Could not load yara_rules/compilers.yara! [!] Error: Could not load yara_rules/suspicious_strings.yara! [!] Error: Could not load yara_rules/domains.yara! [!] Error: Could not load yara_rules/peid.yara!