Suspicious
Suspect

016431fdaab0026f582053be20b5a911

PE Executable
|
MD5: 016431fdaab0026f582053be20b5a911
|
Size: 50.18 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
016431fdaab0026f582053be20b5a911
Sha1
8ee9cc2fb2209a53eace751eecc91e479cc697d1
Sha256
4c7ee077dc8d15fd3afa28f49ee87f78e432fac3bf65581cf5d6cc13db69ffae
Sha384
f952d348609f19432ce82435861588a3f16b704ac5c8ccd3a36cf7d4ebc8a60d18617a9ebde461365895e4821312c422
Sha512
a0a9f0732ec5fcc486e442f13c20e3b329d1b0d2ca603fa184edf851933831a1ccdbd582902c03ce1102863c4a39d7e3f649ea25da8fbb31f2107e138231324c
SSDeep
768:odhO/poiiUcjlJInnr6BH9Xqk5nWEZ5SbTDatuI7CPW59:aw+jjgnwH9XqcnW85SbTQuIl
TLSH
D233F78C5B6C8923E6AF5ABD98324263C7B3E3669532E38F08CCD4E937973855405397

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
Informations
Name
Value
Info

PE Detect: PeReader FAIL, AsmResolver Mapped OK

Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

016431fdaab0026f582053be20b5a911 (50.18 KB)
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PE Layout

MemoryMapped (process dump suspected)

016431fdaab0026f582053be20b5a911

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙