Malicious
Malicious

05aff2b6242e9b2618ade8d34178d46a

PE Executable
|
MD5: 05aff2b6242e9b2618ade8d34178d46a
|
Size: 48.64 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
05aff2b6242e9b2618ade8d34178d46a
Sha1
9c1b71b7c965afe4075e81af8ff050c7649e703b
Sha256
fa23a1aa287992ff7636622d1158ad740d0fda313d5e9e07de5f0e3fecfa889a
Sha384
3d3d674b3badaadf0df546c41e25de8130c3f50e241b82cd99873d2395921cd2dd3af299cdc71e39a1c23bd39b6ca261
Sha512
506cd41f2b375a51d6e69b04119bd9f1c9804a3adadf0523808b1cfd12c37a640a05ca915522584737df310eeeb2908b5773802a84ac9fd47d0ae49364814ac7
SSDeep
768:sq+s3pUtDILNCCa+DiA9anAL4KiiiLYb8geDGqg6tvEgK/JbZVc6KN:sq+AGtQOA9U64KMkbTuGqg6tnkJbZVcD
TLSH
54235C003798813AE6FD4BB4ACF3A2458275D65B6903DA5D7CC814AA1B13FC5D6036FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

aTJEVjB5UXQ5c1haaGtvTFM5MFJQSXptcUdFNTNEeVA=

Pastebin

-

Certificate

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

ServerSignature

CgFtWVwfrgk9ZvsBfwVhrV9BRuuwl7UWytjGTF3/uzrrDiiPiDo84HXTq8Lv2so3m7Wq0jttdJrZH9Kps0vN3aCXXnSmrZd1xroZUvZwiZChJv9oZYORGURpMHTRdsWfd6l37XeEXK77/1mu+VkuwCEV1grg/FQuNM4/PksuhE4=

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Hosts

vps30002026.kozow.com

Ports

3000

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

04-FEB-2026

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

044444febbbb.exe

Full Name

044444febbbb.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

044444febbbb.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

044444febbbb

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

150

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

59

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: call System.Boolean Client.Helper.MutexControl::CreateMutex() call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0057: ldsfld System.String Client.Settings::Anti_Process ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BS_OD call System.Void Client.Helper.AntiProcess::StartBlock() ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Void Client.Helper.ProcessCritical::Set() ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_009D: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Install.NormalStartup::Install() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: call System.Void Client.Connection.Amsi::Bypass() call System.Void Client.Helper.Methods::ClearSetting() call System.Void Client.Connection.Amsi::Bypass() leave IL_00C1: nop pop <null> leave IL_00C1: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00D6: leave IL_00E1 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00E1: ldc.i4 5000 pop <null> leave IL_00E1: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00C1: nop

Module Name

044444febbbb.exe

Full Name

044444febbbb.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

044444febbbb.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

044444febbbb

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

150

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

59

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: call System.Boolean Client.Helper.MutexControl::CreateMutex() call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0057: ldsfld System.String Client.Settings::Anti_Process ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BS_OD call System.Void Client.Helper.AntiProcess::StartBlock() ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Void Client.Helper.ProcessCritical::Set() ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_009D: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Install.NormalStartup::Install() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: call System.Void Client.Connection.Amsi::Bypass() call System.Void Client.Helper.Methods::ClearSetting() call System.Void Client.Connection.Amsi::Bypass() leave IL_00C1: nop pop <null> leave IL_00C1: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00D6: leave IL_00E1 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00E1: ldc.i4 5000 pop <null> leave IL_00E1: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00C1: nop

Artefacts
Name
Value
Key (AES_256)

aTJEVjB5UXQ5c1haaGtvTFM5MFJQSXptcUdFNTNEeVA=

CnC

vps30002026.kozow.com

Ports

3000

Mutex

DcRatMutex_qwqdanchun

05aff2b6242e9b2618ade8d34178d46a (48.64 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

aTJEVjB5UXQ5c1haaGtvTFM5MFJQSXptcUdFNTNEeVA=

Pastebin

-

Certificate

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

ServerSignature

CgFtWVwfrgk9ZvsBfwVhrV9BRuuwl7UWytjGTF3/uzrrDiiPiDo84HXTq8Lv2so3m7Wq0jttdJrZH9Kps0vN3aCXXnSmrZd1xroZUvZwiZChJv9oZYORGURpMHTRdsWfd6l37XeEXK77/1mu+VkuwCEV1grg/FQuNM4/PksuhE4=

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Hosts

vps30002026.kozow.com

Ports

3000

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

04-FEB-2026

Artefacts
Name
Value Location
Key (AES_256)

aTJEVjB5UXQ5c1haaGtvTFM5MFJQSXptcUdFNTNEeVA=

Malicious

05aff2b6242e9b2618ade8d34178d46a

CnC

vps30002026.kozow.com

Malicious

05aff2b6242e9b2618ade8d34178d46a

Ports

3000

Malicious

05aff2b6242e9b2618ade8d34178d46a

Mutex

DcRatMutex_qwqdanchun

Malicious

05aff2b6242e9b2618ade8d34178d46a

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙