Suspicious
Suspect

08a2567e1caa3b15b18683236ae30223

PE Executable
|
MD5: 08a2567e1caa3b15b18683236ae30223
|
Size: 236.54 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
08a2567e1caa3b15b18683236ae30223
Sha1
946eadd0bb167843dac95517d93c8b201679aaa7
Sha256
234dae6411b0a2ceb80b3b2f552adc69f9ae369864279c5b6111d722534b13f8
Sha384
0129d76404a5abf9bd7920726d8e0cf2bd05ca3b14f63f53640a8bcaa33cd868ba325c2421f8ff15fdf18dfb156bfcb2
Sha512
baa05fa044b2b0921f4b5d76d48b1539f648a257fda2921208ad7966f05ce98850adee8e3e2bb0327bb4f8481105a53b2c996aeae21024c4ef13b9d3d7e2daec
SSDeep
6144:xloZM+rIkd8g+EtXHkv/iD4kjY4xfEY3Mmfh8IteftB48e1mx1i:DoZtL+EP8IY4xfEY3Mmfh8ItwAYc
TLSH
31346C1837BCCB16E25F8BBED6B1149F8771F103E90AF78E1C8895E82451B42E949E53

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ?

Module Name

Umbral.payload.exe

Full Name

Umbral.payload.exe

EntryPoint

System.Void 뛱㒾㲩༰籰Ṩ�楸㫒䝗였팇澣஀쨄騭::醤㈾⧧먄뗛꥽砺禹Ӧ๖㾫亳㮇槨(System.String[])

Scope Name

Umbral.payload.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Umbral.payload

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

964

Main Method

System.Void 뛱㒾㲩༰籰Ṩ�楸㫒䝗였팇澣஀쨄騭::醤㈾⧧먄뗛꥽砺禹Ӧ๖㾫亳㮇槨(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task 뛱㒾㲩༰籰Ṩ�楸㫒䝗였팇澣஀쨄騭::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

Module Name

Umbral.payload.exe

Full Name

Umbral.payload.exe

EntryPoint

System.Void 뛱㒾㲩༰籰Ṩ�楸㫒䝗였팇澣஀쨄騭::醤㈾⧧먄뗛꥽砺禹Ӧ๖㾫亳㮇槨(System.String[])

Scope Name

Umbral.payload.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Umbral.payload

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

964

Main Method

System.Void 뛱㒾㲩༰籰Ṩ�楸㫒䝗였팇澣஀쨄騭::醤㈾⧧먄뗛꥽砺禹Ӧ๖㾫亳㮇槨(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task 뛱㒾㲩༰籰Ṩ�楸㫒䝗였팇澣஀쨄騭::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

08a2567e1caa3b15b18683236ae30223 (236.54 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙