Suspicious
Suspect

07ba03e7e1673bb9f3709a3aa203f362

PE Executable
|
MD5: 07ba03e7e1673bb9f3709a3aa203f362
|
Size: 377.34 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
07ba03e7e1673bb9f3709a3aa203f362
Sha1
4542ad7df22ea4df71309208010712c0ffa5f7c6
Sha256
e139d83928a106d94c0951cced11070dd1c0b9ecaa3a13aa7b90bfabe43e41c2
Sha384
6991db5c9ceef1c723233ca7d75f96c5f7a03a1a49d7fe15cb6e55b6c3d88861aa5d9267694a0fb4bf092d027e0d721f
Sha512
81cfe8e88adb58a29923ceb4091d086954ccf9dc5b338d2e0b8afb14eda8734b30d7ddbba19e602db22c3a6473a76ff12fedd194437e6642d59774798921cbdb
SSDeep
6144:lPjMoLro/Y3i3eksyzZxlzoxhCRctQjCTPwCqlt2bgYS630Uns3K33fh:lPPgGiXZVXihCaYIMYSss3KnZ
TLSH
6C8423BAE089C670C94DC37DE78795660755E141D70203BDE63262A83A4F3B8DE47FA8

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Azxmqgafobr.Properties.Resources.resources
Jigvnus
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Azxmqgafobr.exe

Full Name

Azxmqgafobr.exe

EntryPoint

System.Void Azxmqgafobr.Equpmuj::Main()

Scope Name

Azxmqgafobr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Azxmqgafobr

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

6

Main Method

System.Void Azxmqgafobr.Equpmuj::Main()

Main IL Instruction Count

22

Main IL

ldc.i4 1 stloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] ldloc V_0 ldc.i4 989 beq IL_0009: ldloc V_0 br IL_002D: call System.Boolean S0iqjm6ReI7NyOXsgt.dBENau8pKZsQ9Zk7a4::aZMBwREEr() call System.Boolean S0iqjm6ReI7NyOXsgt.dBENau8pKZsQ9Zk7a4::aZMBwREEr() brfalse IL_0056: newobj System.Void System.Exception::.ctor() ldc.i4 0 ldsfld <Module>{defd0e17-9499-4406-a75a-f4a81a3b7014} <Module>{defd0e17-9499-4406-a75a-f4a81a3b7014}::m_d8c2bceb7d7344aba7d8330f444388e1 ldfld System.Int32 <Module>{defd0e17-9499-4406-a75a-f4a81a3b7014}::m_b585f72696f04fc6916f5b3ecb646a8d brfalse IL_000D: switch(IL_005D,IL_002D) pop <null> ldc.i4 6 br IL_000D: switch(IL_005D,IL_002D) newobj System.Void System.Exception::.ctor() throw <null> ret <null> br IL_005C: ret br IL_0056: newobj System.Void System.Exception::.ctor()

Module Name

Azxmqgafobr.exe

Full Name

Azxmqgafobr.exe

EntryPoint

System.Void Azxmqgafobr.Equpmuj::Main()

Scope Name

Azxmqgafobr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Azxmqgafobr

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

6

Main Method

System.Void Azxmqgafobr.Equpmuj::Main()

Main IL Instruction Count

22

Main IL

ldc.i4 1 stloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] ldloc V_0 ldc.i4 989 beq IL_0009: ldloc V_0 br IL_002D: call System.Boolean S0iqjm6ReI7NyOXsgt.dBENau8pKZsQ9Zk7a4::aZMBwREEr() call System.Boolean S0iqjm6ReI7NyOXsgt.dBENau8pKZsQ9Zk7a4::aZMBwREEr() brfalse IL_0056: newobj System.Void System.Exception::.ctor() ldc.i4 0 ldsfld <Module>{defd0e17-9499-4406-a75a-f4a81a3b7014} <Module>{defd0e17-9499-4406-a75a-f4a81a3b7014}::m_d8c2bceb7d7344aba7d8330f444388e1 ldfld System.Int32 <Module>{defd0e17-9499-4406-a75a-f4a81a3b7014}::m_b585f72696f04fc6916f5b3ecb646a8d brfalse IL_000D: switch(IL_005D,IL_002D) pop <null> ldc.i4 6 br IL_000D: switch(IL_005D,IL_002D) newobj System.Void System.Exception::.ctor() throw <null> ret <null> br IL_005C: ret br IL_0056: newobj System.Void System.Exception::.ctor()

07ba03e7e1673bb9f3709a3aa203f362 (377.34 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Azxmqgafobr.Properties.Resources.resources
Jigvnus
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙