File Name | JJSploit.exe |
File Type |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Scanner Version | 1.0.182.174 |
Database Version | 2024-07-14 21:00:22 UTC |
Malware family: Agent
Hash Type | Value | Action |
---|---|---|
MD5 |
9025b1a81a264417aa8aa18a56075f88
|
|
SHA1 |
d3b0c130acd815e9f7430d7f0857b05430420279
|
|
SHA256 |
2a19e43202cef88fdabb63be7811cb4214ed455aeac227ea6a86b19d60a9d14d
|
|
SHA512 |
63ea2d941ba66a30fbd57aee2758129414563e556479ff8e0911c4db0c8d2827ef58750b665e1b630009a730f542f790f771c89c9e5148747b98a4741c334d7c
|
|
ImpHash |
f212b9b898203f30e4f25111809dedeb
|
Icon |
Hash: 96ad1c965561d8172f7c7392e862dfb2
Fuzzy: 1e8bb244ddd597b1ad839c26154fbef4 dHash: 70e892f4ac886070 |
Image Base | 0x00400000 |
Entry Point | 0x00966585 |
Compilation Time | 2023-09-12 23:53:30 |
Checksum | 0x00000000 (Actual: 0x009dc7c0) |
OS Version | 6.0 |
PEiD Signatures |
PE32 executable (GUI) Intel 80386, for MS Windows
|
PDB Path | C:\Users\burne\Desktop\JJSploit\src-tauri\target\i686-pc-windows-msvc\release\deps\wearedevs_net.pdb |
Digital Signature | The PE file does not contain a certificate table. |
Imports | 27 libraries |
Exports | 0 functions |
Resources | 4 Resources |
Sections | 5 Sections |
FileDescription | JJSploit |
FileVersion | 7.3.0 |
ProductVersion | 7.3.0 |
ProductName | JJSploit |
Translation | 0x0000 0x04b0 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
5,804,008 bytes | 5,804,032 bytes | 6.41 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
C8B90EF109BDF55C3AC37823625BE624 |
.rdata |
0x0058a000 |
4,290,282 bytes | 4,290,560 bytes | 7.19 (Compressed) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
35BF127658B38C1F29BDD11F3A1F0F3A |
.data |
0x009a2000 |
9,700 bytes | 7,168 bytes | 3.28 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
638028EDEE4B212B365E567F80A72961 |
.rsrc |
0x009a5000 |
23,400 bytes | 23,552 bytes | 7.90 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
4D70429682081B93E18964B179615923 |
.reloc |
0x009ab000 |
202,268 bytes | 202,752 bytes | 6.57 (Compressed) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
2A092588D312300F8A845C487E80740C |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
2 section(s) with elevated entropy (≥6.5) - possible compression
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 1 | 22,301 bytes | |
RT_GROUP_ICON | 1 | 20 bytes | |
RT_VERSION | 1 | 424 bytes | |
RT_MANIFEST | 1 | 338 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The PE file does not contain a certificate table.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Trojan.Win32.Agent.sa without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system