Threat Database Malware Malware.PePack.Gen

Malware.PePack.Gen

By CagedTech in Malware, Trojans

Analysis Report

General information

Family Name: Malware.PePack.Gen
Signature status: No Signature

Known Samples

MD5: 54f87f638aea7a8ca9587fef058fede2
SHA1: e13d6ee6b7ac291432eb6be905de93905c717ffa
File Size: 32.26 KB, 32256 bytes
MD5: 0cc7ef4b26e16407a4a5c9eb7f06054f
SHA1: 1e0b48c7ee73fd644da1f04613280877793521f9
SHA256: A2572406D3E56E47F3AFA06F3F2FBB9A66499402CF67C04DAA5A01E25C33D954
File Size: 285.18 KB, 285184 bytes
MD5: 1f34c3343c7c40ed1aacd211a268a2ee
SHA1: 06fc729a071c69371cb772e4a4e3be9058fbba32
SHA256: 96F9FF9DD631C5D7032DA00DAEF45C89A51869047D6BAFD7FD9F0B9F79BAEB0E
File Size: 65.54 KB, 65536 bytes
MD5: 0f2ba4ecad687772947b31d987f47b6d
SHA1: 3d7d80f4dff5fd704edb20de7be26ff0a5d9a786
SHA256: 7B47BD49B4EF9A75198191DF9CA0D3245DE604301964E825E2EF27687DBDB086
File Size: 399.87 KB, 399872 bytes
MD5: bae10b4ca5c2909908f82d3c9541a825
SHA1: 0750e88bef160cf478a39f9d384644e97b6e9cca
SHA256: FAAE7FAB5EEF566FD0A97DFE6BE998A45122C79ADBADED57BAC33D3DCB9B3B64
File Size: 399.87 KB, 399872 bytes
Show More
MD5: 03918eb88f5c6084052fd94d2bba9c41
SHA1: 868ef99fe45a61922201b623686f17a4bc67bdc5
SHA256: C6650A628FF5092B584970518F10E0341C1CA66627A5F8326C85BA84CA943F94
File Size: 700.93 KB, 700928 bytes
MD5: 503764a06ca9d8ca923f9fd403c82439
SHA1: 09305277fc93b17113a6206cc1eb1d4b0bd4293e
SHA256: C0F07A723050AED01D0D98E85DEE2FB56EADD73ACB1917B53A15633F245F39DE
File Size: 811.74 KB, 811738 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments
  • Fifamania Regenerator 06
  • I cannot be held responsible for actions taken with or as a result of the use or mis-use of this program. You assume full responsability for your actions. If you do not agree to these terms, DO NOT use this program.
Company Name
  • Fifamania
  • GCG [http://come.to/gcg]
  • Injetron - Chiptronic
  • SBZ systems
File Description
  • Crack
  • Decode
  • EMDI
  • Fifamania Regenerator 06
File Version
  • 2.6.0.859
  • 1.00
  • 1.0.1.22
Internal Name
  • decode.exe
  • EMDI
  • FMRegenerator06
  • gcg_NeverForget
Legal Copyright
  • (c) 2006 by Alex Bernardi
  • Ailton Aparecido de Almeida
  • ©2003-2006 by SBZ systems
  • ® 1998 by RAHOWA
Legal Trademarks FIFAMANIA.IT
Original Filename
  • decode.exe
  • FMRegenerator06.exe
  • gcg_NeverForget.exe
Product Name
  • Crack
  • EMDI
  • Fifamania Regenerator 06
  • Professional Decode
Product Version
  • 2
  • 1.00
  • 1.0.1.20

File Traits

  • HighEntropy
  • No Version Info
  • x86

Block Information

Similar Families

  • IRCBot.D

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_16.db Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_idx.db Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\insf33f.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-1nvgp.tmp\_isbunzp.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-1nvgp.tmp\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\~dff1eb1236de18717d.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\data\fifa.fat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\data\fifa.fat Synchronize,Write Attributes

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Service Control
  • OpenSCManager

Shell Command Execution

C:\Users\Zctlhavb\AppData\Local\Temp\INSF33F.tmp /SL3 $8017C c:\users\user\downloads\09305277fc93b17113a6206cc1eb1d4b0bd4293e_0000811738 794329 797894 61440

Trending

Most Viewed

Loading...