Malicious
Malicious

134200cc0a80f92f56e99b9fd0fd22d1

PE Executable
|
MD5: 134200cc0a80f92f56e99b9fd0fd22d1
|
Size: 37.89 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
134200cc0a80f92f56e99b9fd0fd22d1
Sha1
1de446472d6b08d4d987eba8a75fe025d62e9545
Sha256
a62ca2b3feebabf5ebd5367e8106d20b89373e009e97fd26df904ea0b6f06708
Sha384
b5b916764b4cdfb3c142d6d37e3951ea39592529564428952982d90fbf4e5c583437acaefbec082bd462aad29c80def8
Sha512
4f9849063dc9df82d90bc6998d35b2bc8130a38b420d525b4b6227240ac82d4cafcf635e21e86b8ed17ab1707ea13642bead6e343877ccf28922bc1dfd18d38e
SSDeep
384:VlCKMizd/jnBhFbJ8ycP713V5wy+39rAF+rMRTyN/0L+EcoinblneHQM3epzXKNU:jCg/lLJfcP7139+NrM+rMRa8Nuket
TLSH
86033B4D7FE18168C5FD057706B2D41207BAE04F6E23DA1E8EE564AA37636C18F50AF2

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - njRAT config.
Config. Field
Value
packet_size [b]

5121

BD [BD]

False

directory [DR]

TEMP

executable_name [EXE]

server.exe

cnc_host [HH]

tancong.xoilaczzqzpt.tv

is_dir_defined [Idr]

False

is_startup_folder [IsF]

False

is_user_reg [Isu]

False

NH [NH]

0

cnc_port [P]

443

reg_key [RG]

26d861a0a1f77af694c49c30fd69c964

reg_path [sf]

Software\Microsoft\Windows\CurrentVersion\Run

sizk

20

victim_name [VN]

HacKed

version [VR]

im523

splitter [Y]

|'|'|

HD

False

anti [anti]

Exsample.exe

anti2 [anti2]

False

usb [usb]

False

usbx [usbx]

svchost.exe

task [task]

True

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

w.exe

Full Name

w.exe

EntryPoint

System.Void w.A::main()

Scope Name

w.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

w

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

338

Main Method

System.Void w.A::main()

Main IL Instruction Count

5

Main IL

nop <null> call System.Void w.OK::ko() nop <null> nop <null> ret <null>

Module Name

w.exe

Full Name

w.exe

EntryPoint

System.Void w.A::main()

Scope Name

w.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

w

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

338

Main Method

System.Void w.A::main()

Main IL Instruction Count

5

Main IL

nop <null> call System.Void w.OK::ko() nop <null> nop <null> ret <null>

Artefacts
Name
Value
Port

443

134200cc0a80f92f56e99b9fd0fd22d1 (37.89 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - njRAT config.
Config. Field
Value
packet_size [b]

5121

BD [BD]

False

directory [DR]

TEMP

executable_name [EXE]

server.exe

cnc_host [HH]

tancong.xoilaczzqzpt.tv

is_dir_defined [Idr]

False

is_startup_folder [IsF]

False

is_user_reg [Isu]

False

NH [NH]

0

cnc_port [P]

443

reg_key [RG]

26d861a0a1f77af694c49c30fd69c964

reg_path [sf]

Software\Microsoft\Windows\CurrentVersion\Run

sizk

20

victim_name [VN]

HacKed

version [VR]

im523

splitter [Y]

|'|'|

HD

False

anti [anti]

Exsample.exe

anti2 [anti2]

False

usb [usb]

False

usbx [usbx]

svchost.exe

task [task]

True

Artefacts
Name
Value Location
Port

443

Malicious

134200cc0a80f92f56e99b9fd0fd22d1

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙