File Name | 888RAT.exe |
File Type |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Scanner Version | 1.0.222.174 |
Database Version | 2025-08-10 18:00:31 UTC |
Malware family: Keylogger
Hash Type | Value | Action |
---|---|---|
MD5 |
554cd80e1b5fc6c7d296b23e4b400664
|
|
SHA1 |
550d2da6068683ae545c3ca8910ec37671764fad
|
|
SHA256 |
1b6148c640e0d63bfd74b9df003b3214dacf2aa678a7fce1075c25cf033e0e5c
|
|
SHA512 |
7b3dd3ea1e85dbc66d299ff31891127a5fe8995ac7cc0741896a0593c439677f3734f0b5f925353fe5b1773f24344b1f8c274d4c7eab158566444fd110a4714c
|
|
ImpHash |
649f6ed9a4d576c154bbc0357156a4a4
|
Icon |
Hash: 332f685b305d38ba0607846e562abe7c
Fuzzy: 23160a430fed6a1d11f7bc728168091c dHash: e8b269d4d469b2e8 |
Image Base | 0x00400000 |
Entry Point | 0x0042800a |
Compilation Time | 2019-07-02 10:07:00 |
Checksum | 0x02671b34 (Actual: 0x0266f4b5) |
OS Version | 5.1 |
PEiD Signatures |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Digital Signature | No valid SignedData structure was found. |
Imports | 18 libraries |
Exports | 0 functions |
Resources | 32 Resources |
Sections | 5 Sections |
Translation | 0x0809 0x04b0 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
581,597 bytes | 581,632 bytes | 6.68 (Compressed) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
310E36668512D53489C005622BB1B4A9 |
.rdata |
0x0008f000 |
195,982 bytes | 196,096 bytes | 5.76 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
748CF1AB2605CE1FD72D53D912ABB68F |
.data |
0x000bf000 |
36,724 bytes | 20,992 bytes | 1.20 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
AAE9601D920F07080BDFADF43DFEFF12 |
.rsrc |
0x000c8000 |
39,450,752 bytes | 39,451,136 bytes | 8.00 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
132EDFD50646B77EDB1124FEB47659B0 |
.reloc |
0x02668000 |
28,980 bytes | 29,184 bytes | 6.78 (Compressed) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
F04128AD0F87F42830E4A6CDBC38C719 |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
2 section(s) with elevated entropy (≥6.5) - possible compression
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 15 | 54,576 bytes | |
RT_MENU | 1 | 80 bytes | |
RT_DIALOG | 1 | 252 bytes | |
RT_STRING | 7 | 8,900 bytes | |
RT_RCDATA | 1 | 39,383,731 bytes | |
RT_GROUP_ICON | 5 | 240 bytes | |
RT_VERSION | 1 | 220 bytes | |
RT_MANIFEST | 1 | 1,007 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
No valid SignedData structure was found.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Spy.Win32.Keylogger.cld without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system