Malicious
Malicious

0882916ef89e007c813131d214f4c5f2

PE Executable
|
MD5: 0882916ef89e007c813131d214f4c5f2
|
Size: 133.12 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
0882916ef89e007c813131d214f4c5f2
Sha1
5748ec0cd59f07b11abe86e213393c31019ca3ca
Sha256
b6badd77d0d32c295b8b9f66afef0437e4a6fdc9db5d8dff50a858b068f1d025
Sha384
0fce158f43321451dbe09cfcd92e06fa609a361521af991244668985481f4cf805287c4e527f0b9ec805a5be30e1b654
Sha512
002aa36ce9ee58a34871cb8a884260ba31ac3548e7c1076be152771f010e2b040d5dba07dbdff9fd4938c5907c1ee501d9455195f5574c0c20f05154f179a702
SSDeep
1536:ylQz7VmWQYCSk1GbbwwqDuENGqAvKJYrkVclN:y+7VmWQs0Gbbw3uPgiWY
TLSH
01D3068026D48751D05C06B668AE79F006EDFD6E2101CDDF68F4F38A967B78FC61329A

PeID

Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

YnVDMUtsSEdzV1d5aGdybk9iWkxBMzAzckpIcnQ1djg=

Pastebin

-

Certificate

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

ServerSignature

iu6nbeP77YftR55xC5v3gpey7Wxv1uOvP9veSolyPWg/DZ0hbQ/lSejpk++coKT99iCugiB8pE9bYkUTeIaxK05eUPLWHnXX8b63Cy2gla8qo8ftMk9sH1dB604r0xhn5jT/zvUfkKDhnrCrgdCgZ+3QkmSjyIgyp3McxpNrQfI=

Install

true

BDOS

false

Anti-VM

true

Install File

chrome.exe

Install-Folder

%AppData%

Hosts

ok99.jp.net,app.ok99.jp.net,www.ok99.jp.net

Ports

80,443,8080,8848

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Chrome.exe

Full Name

Chrome.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Chrome.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Chrome

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Chrome.exe

Full Name

Chrome.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Chrome.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Chrome

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

YnVDMUtsSEdzV1d5aGdybk9iWkxBMzAzckpIcnQ1djg=

CnC

ok99.jp.net

CnC

app.ok99.jp.net

CnC

www.ok99.jp.net

Ports

80

Ports

443

Ports

8080

Ports

8848

Mutex

DcRatMutex_qwqdanchun

0882916ef89e007c813131d214f4c5f2 (133.12 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

YnVDMUtsSEdzV1d5aGdybk9iWkxBMzAzckpIcnQ1djg=

Pastebin

-

Certificate

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

ServerSignature

iu6nbeP77YftR55xC5v3gpey7Wxv1uOvP9veSolyPWg/DZ0hbQ/lSejpk++coKT99iCugiB8pE9bYkUTeIaxK05eUPLWHnXX8b63Cy2gla8qo8ftMk9sH1dB604r0xhn5jT/zvUfkKDhnrCrgdCgZ+3QkmSjyIgyp3McxpNrQfI=

Install

true

BDOS

false

Anti-VM

true

Install File

chrome.exe

Install-Folder

%AppData%

Hosts

ok99.jp.net,app.ok99.jp.net,www.ok99.jp.net

Ports

80,443,8080,8848

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

YnVDMUtsSEdzV1d5aGdybk9iWkxBMzAzckpIcnQ1djg=

Malicious

0882916ef89e007c813131d214f4c5f2

CnC

ok99.jp.net

Malicious

0882916ef89e007c813131d214f4c5f2

CnC

app.ok99.jp.net

Malicious

0882916ef89e007c813131d214f4c5f2

CnC

www.ok99.jp.net

Malicious

0882916ef89e007c813131d214f4c5f2

Ports

80

Malicious

0882916ef89e007c813131d214f4c5f2

Ports

443

Malicious

0882916ef89e007c813131d214f4c5f2

Ports

8080

Malicious

0882916ef89e007c813131d214f4c5f2

Ports

8848

Malicious

0882916ef89e007c813131d214f4c5f2

Mutex

DcRatMutex_qwqdanchun

Malicious

0882916ef89e007c813131d214f4c5f2

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙