Suspicious
Suspect

004646a4f29776e72fdad6a4469b2600

PE Executable
|
MD5: 004646a4f29776e72fdad6a4469b2600
|
Size: 2.17 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
004646a4f29776e72fdad6a4469b2600
Sha1
a690c5ca46c585cddffc9e8d04413d0895774075
Sha256
d0fdf8d7394d40debb1147cde780dd3ff5eded6f118e97d21d11f5bf6309a33c
Sha384
b0afa3d9c94bb52150c6616045f547c01d82c50401e4e878821b319d9b0924bc08b5aa1346ccc9681a8ae8e915e8d800
Sha512
e044eb40249d8143adb23828ad8823cf0621b0be9a6b260dbfd667228b008a0ab621e12b2cde55bfc095128be0c188327a988a103116eae1ec71f9ac9f1c6a40
SSDeep
49152:SmSKTGT4/FXYJTpblQ4gYnRwG1JEQBkezSWQ:SuVXEZrheEJFGe8
TLSH
98A5F1E0FA6CAA5ED47A6F7AD0F7162007F4A8529E33EE09081450CA0653717BDE25F7

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Bixjsu.Properties.Resources.resources
Snotbawqc
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

851064920.exe

Full Name

851064920.exe

EntryPoint

System.Void Bixjsu.Tpocr::Main()

Scope Name

851064920.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

851064920

Assembly Version

1.0.4309.2327

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

4890

Main Method

System.Void Bixjsu.Tpocr::Main()

Main IL Instruction Count

75

Main IL

nop <null> ldnull <null> stloc.0 <null> br IL_001E: ldc.i4.1 nop <null> nop <null> call System.Byte[] Bixjsu.Properties.Nnqflujk::get_Snotbawqc() stloc.0 <null> leave IL_0022: ldloc.0 pop <null> nop <null> nop <null> leave IL_001D: nop nop <null> ldc.i4.1 <null> stloc.1 <null> br.s IL_0008: nop ldloc.0 <null> ldnull <null> cgt.un <null> stloc.2 <null> ldloc.2 <null> brfalse IL_00A9: ret nop <null> ldloc.0 <null> call System.Byte[] Bixjsu.Tpocr::Ubphogb(System.Byte[]) stloc.3 <null> ldloc.3 <null> ldlen <null> ldc.i4.0 <null> cgt.un <null> stloc.s V_4 ldloc.s V_4 brfalse IL_00A8: nop nop <null> ldloc.3 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stloc.s V_5 ldloc.s V_5 callvirt System.String System.Reflection.Assembly::get_CodeBase() call System.Boolean System.String::IsNullOrWhiteSpace(System.String) ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brfalse IL_00A7: nop nop <null> ldstr DxmrZSDJuKr0mSpW1o.bHupdgf4Jvgktqpu4Y stloc.s V_7 ldloc.s V_5 ldloc.s V_7 callvirt System.Type System.Reflection.Assembly::GetType(System.String) stloc.s V_8 ldloc.s V_8 callvirt System.String System.Type::get_FullName() call System.Boolean System.String::IsNullOrEmpty(System.String) ldc.i4.0 <null> ceq <null> stloc.s V_9 ldloc.s V_9 brfalse IL_00A6: nop nop <null> ldloc.s V_8 ldstr eKEZ4efjy ldc.i4 256 ldnull <null> ldnull <null> ldnull <null> callvirt System.Object System.Type::InvokeMember(System.String,System.Reflection.BindingFlags,System.Reflection.Binder,System.Object,System.Object[]) pop <null> nop <null> nop <null> nop <null> nop <null> ret <null>

Module Name

851064920.exe

Full Name

851064920.exe

EntryPoint

System.Void Bixjsu.Tpocr::Main()

Scope Name

851064920.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

851064920

Assembly Version

1.0.4309.2327

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

4890

Main Method

System.Void Bixjsu.Tpocr::Main()

Main IL Instruction Count

75

Main IL

nop <null> ldnull <null> stloc.0 <null> br IL_001E: ldc.i4.1 nop <null> nop <null> call System.Byte[] Bixjsu.Properties.Nnqflujk::get_Snotbawqc() stloc.0 <null> leave IL_0022: ldloc.0 pop <null> nop <null> nop <null> leave IL_001D: nop nop <null> ldc.i4.1 <null> stloc.1 <null> br.s IL_0008: nop ldloc.0 <null> ldnull <null> cgt.un <null> stloc.2 <null> ldloc.2 <null> brfalse IL_00A9: ret nop <null> ldloc.0 <null> call System.Byte[] Bixjsu.Tpocr::Ubphogb(System.Byte[]) stloc.3 <null> ldloc.3 <null> ldlen <null> ldc.i4.0 <null> cgt.un <null> stloc.s V_4 ldloc.s V_4 brfalse IL_00A8: nop nop <null> ldloc.3 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stloc.s V_5 ldloc.s V_5 callvirt System.String System.Reflection.Assembly::get_CodeBase() call System.Boolean System.String::IsNullOrWhiteSpace(System.String) ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brfalse IL_00A7: nop nop <null> ldstr DxmrZSDJuKr0mSpW1o.bHupdgf4Jvgktqpu4Y stloc.s V_7 ldloc.s V_5 ldloc.s V_7 callvirt System.Type System.Reflection.Assembly::GetType(System.String) stloc.s V_8 ldloc.s V_8 callvirt System.String System.Type::get_FullName() call System.Boolean System.String::IsNullOrEmpty(System.String) ldc.i4.0 <null> ceq <null> stloc.s V_9 ldloc.s V_9 brfalse IL_00A6: nop nop <null> ldloc.s V_8 ldstr eKEZ4efjy ldc.i4 256 ldnull <null> ldnull <null> ldnull <null> callvirt System.Object System.Type::InvokeMember(System.String,System.Reflection.BindingFlags,System.Reflection.Binder,System.Object,System.Object[]) pop <null> nop <null> nop <null> nop <null> nop <null> ret <null>

004646a4f29776e72fdad6a4469b2600 (2.17 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Bixjsu.Properties.Resources.resources
Snotbawqc
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙