Suspicious
Suspect

0a14897a0ccfa77d9c5c6323a25c06c4

PE Executable
|
MD5: 0a14897a0ccfa77d9c5c6323a25c06c4
|
Size: 46.59 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
0a14897a0ccfa77d9c5c6323a25c06c4
Sha1
0f0a8bddd6235075fc47749d34a7e9f2e414b191
Sha256
384afed09f41f19ce3b378a5e8955c13e8f5ba54ec0b6682a88fe45f42ddd9d1
Sha384
6628ad08c8e6e0bf6685234dfe098f649b641eff3d97778eb68d4f1516f2f41c54c24f4ba49a5d4e4b47963fe3842c68
Sha512
4ce9c8e193663714fdc6803e990a4580396626af3732e3e4e72b332838cb41b7277ff916ccf0455d2206c4445543d8649b16205bb308ca862f83ea0e1061d405
SSDeep
768:ZdhO/poiiUcjlJInzr6BH9Xqk5nWEZ5SbTDaNuI7CPW5Q:Xw+jjgnkH9XqcnW85SbTQuI4
TLSH
9A23E84C57AC8923E6AF5ABD9832426387B3F2669532E38F08CCD4E9379338555053A7

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

0a14897a0ccfa77d9c5c6323a25c06c4 (46.59 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙