Symbol Obfuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 134200cc0a80f92f56e99b9fd0fd22d1
|
| Sha1 | 1de446472d6b08d4d987eba8a75fe025d62e9545
|
| Sha256 | a62ca2b3feebabf5ebd5367e8106d20b89373e009e97fd26df904ea0b6f06708
|
| Sha384 | b5b916764b4cdfb3c142d6d37e3951ea39592529564428952982d90fbf4e5c583437acaefbec082bd462aad29c80def8
|
| Sha512 | 4f9849063dc9df82d90bc6998d35b2bc8130a38b420d525b4b6227240ac82d4cafcf635e21e86b8ed17ab1707ea13642bead6e343877ccf28922bc1dfd18d38e
|
| SSDeep | 384:VlCKMizd/jnBhFbJ8ycP713V5wy+39rAF+rMRTyN/0L+EcoinblneHQM3epzXKNU:jCg/lLJfcP7139+NrM+rMRa8Nuket
|
| TLSH | 86033B4D7FE18168C5FD057706B2D41207BAE04F6E23DA1E8EE564AA37636C18F50AF2
|
PeID
|
Config. Field0 | Value |
|---|---|
| packet_size [b] | 5121 |
| BD [BD] | False |
| directory [DR] | TEMP |
| executable_name [EXE] | server.exe |
| cnc_host [HH] | tancong.xoilaczzqzpt.tv |
| is_dir_defined [Idr] | False |
| is_startup_folder [IsF] | False |
| is_user_reg [Isu] | False |
| NH [NH] | 0 |
| cnc_port [P] | 443 |
| reg_key [RG] | 26d861a0a1f77af694c49c30fd69c964 |
| reg_path [sf] | Software\Microsoft\Windows\CurrentVersion\Run |
| sizk | 20 |
| victim_name [VN] | HacKed |
| version [VR] | im523 |
| splitter [Y] | |'|'| |
| HD | False |
| anti [anti] | Exsample.exe |
| anti2 [anti2] | False |
| usb [usb] | False |
| usbx [usbx] | svchost.exe |
| task [task] | True |
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Module Name | w.exe |
| Full Name | w.exe |
| EntryPoint | System.Void w.A::main() |
| Scope Name | w.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v2.0.50727 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | w |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 338 |
| Main Method | System.Void w.A::main() |
| Main IL Instruction Count | 5 |
| Main IL | nop <null> call System.Void w.OK::ko() nop <null> nop <null> ret <null> |
| Module Name | w.exe |
| Full Name | w.exe |
| EntryPoint | System.Void w.A::main() |
| Scope Name | w.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v2.0.50727 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | w |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 338 |
| Main Method | System.Void w.A::main() |
| Main IL Instruction Count | 5 |
| Main IL | nop <null> call System.Void w.OK::ko() nop <null> nop <null> ret <null> |
|
Name0 | Value |
|---|---|
| Port | 443 |
|
Config. Field0 | Value |
|---|---|
| packet_size [b] | 5121 |
| BD [BD] | False |
| directory [DR] | TEMP |
| executable_name [EXE] | server.exe |
| cnc_host [HH] | tancong.xoilaczzqzpt.tv |
| is_dir_defined [Idr] | False |
| is_startup_folder [IsF] | False |
| is_user_reg [Isu] | False |
| NH [NH] | 0 |
| cnc_port [P] | 443 |
| reg_key [RG] | 26d861a0a1f77af694c49c30fd69c964 |
| reg_path [sf] | Software\Microsoft\Windows\CurrentVersion\Run |
| sizk | 20 |
| victim_name [VN] | HacKed |
| version [VR] | im523 |
| splitter [Y] | |'|'| |
| HD | False |
| anti [anti] | Exsample.exe |
| anti2 [anti2] | False |
| usb [usb] | False |
| usbx [usbx] | svchost.exe |
| task [task] | True |
|
Name0 | Value | Location |
|---|---|---|
| Port | 443 Malicious |
134200cc0a80f92f56e99b9fd0fd22d1 |