Suspicious
Suspect

159acf537580ca9d5562978f5cb29c57

PE Executable
|
MD5: 159acf537580ca9d5562978f5cb29c57
|
Size: 2.63 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
159acf537580ca9d5562978f5cb29c57
Sha1
07e89e541863dcceb4e7e877dad82fc24421173e
Sha256
c1a71d2b4fb2a6597b6cd048f06a45138cab520bda7e59bd55b192e443bd9670
Sha384
bc11544bb28c564a0a5f749aa9346c0d02a6017eea73d1ac72e223a9554f2386a49167e8e3acaf4f1012b03a70405cda
Sha512
2d06217bb7de5713a17e9b8c5de0fd8437f043ad3833f7cb9bfd9db048045515ca6573473f10aaf5151b32bbdea3a866ad15cf1b13a983c805a8357bd1a433c6
SSDeep
49152:P85S0yTNXoPF3f5BkXdkEZBJ0Tpc8iYM57G+vSVMZ5i6BEC8ysTVeuK+hl:QS0yTNXoPF3f5BkXdkEz6TFMYqZwhC2X
TLSH
F2C512017A8B8F32E55E50379FD536A2556F7BE00EBAD7E7A36C980C86005BD8CB0674

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
1NmmrArzWY05.Xvywujd7.ros
NV7t4xj.bat
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
STRING
ID:07D1
ID:4
ID:7
ID:9
ID:10
ID:12
ID:1028
ID:1040
ID:07D2
ID:4
ID:7
ID:9
ID:10
ID:12
ID:1028
ID:1040
ID:07D3
ID:4
ID:7
ID:9
ID:10
ID:12
ID:1028
ID:1040
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0008
ID:0
ID:0-preview.png
RT_DIALOG
ID:0069
ID:0
ID:0084
ID:0
RT_GROUP_CURSOR4
ID:07D0
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
RT_MANIFEST
ID:0001
ID:1033
​  ​     
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

DownloaderApp.exe

Full Name

DownloaderApp.exe

EntryPoint

System.Void  ::(System.String[])

Scope Name

DownloaderApp.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

DownloaderApp

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

0

Main Method

System.Void  ::(System.String[])

Main IL Instruction Count

106

Main IL

call System.Boolean  ::() brtrue.s IL_0015: call System.Boolean System.Environment::get_UserInteractive() call System.Void  ::() leave.s IL_0014: ret pop <null> leave IL_0155: ret ret <null> call System.Boolean System.Environment::get_UserInteractive() brtrue.s IL_0027: ldc.i4 -1227018388 newobj System.Void  ::.ctor() call System.Void System.ServiceProcess.ServiceBase::Run(System.ServiceProcess.ServiceBase) ret <null> ldc.i4 -1227018388 call System.String  ::(System.Int32) stloc.2 <null> ldc.i4 -1227018381 call System.String  ::(System.Int32) stloc.3 <null> ldc.i4 -1227018406 call System.String  ::(System.Int32) stloc.s V_4 ldc.i4.s 36 call System.String System.Environment::GetFolderPath(System.Environment/SpecialFolder) dup <null> ldloc.2 <null> call System.String System.IO.Path::Combine(System.String,System.String) stloc.0 <null> ldloc.3 <null> call System.String System.IO.Path::Combine(System.String,System.String) stloc.1 <null> ldc.i4 -1227018462 call System.String  ::(System.Int32) ldloc.0 <null> call System.Void  ::(System.String,System.String) ldc.i4 -1227018494 call System.String  ::(System.Int32) ldloc.1 <null> call System.Void  ::(System.String,System.String) ldloc.0 <null> ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) ldloc.1 <null> ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) ldloc.0 <null> call System.Void  ::(System.String) ldloc.1 <null> call System.Void  ::(System.String) call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() callvirt System.String System.Reflection.Assembly::get_Location() call System.Void  ::(System.String) ldloc.0 <null> ldloc.s V_4 call System.Void  ::(System.String,System.String) newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() dup <null> ldc.i4 -1227018270 call System.String  ::(System.Int32) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) dup <null> ldc.i4 -1227018256 call System.String  ::(System.Int32) ldloc.0 <null> ldc.i4 -1227018300 call System.String  ::(System.Int32) call System.String System.String::Concat(System.String,System.String,System.String) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Arguments(System.String) dup <null> ldc.i4.0 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_CreateNoWindow(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_WindowStyle(System.Diagnostics.ProcessWindowStyle) call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() dup <null> ldc.i4 -1227018270 call System.String  ::(System.Int32) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) dup <null> ldc.i4 -1227018256 call System.String  ::(System.Int32) ldloc.1 <null> ldc.i4 -1227018300 call System.String  ::(System.Int32) call System.String System.String::Concat(System.String,System.String,System.String) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Arguments(System.String) dup <null> ldc.i4.0 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_CreateNoWindow(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_WindowStyle(System.Diagnostics.ProcessWindowStyle) call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> leave.s IL_0155: ret pop <null> leave.s IL_0155: ret ret <null>

Module Name

DownloaderApp.exe

Full Name

DownloaderApp.exe

EntryPoint

System.Void  ::(System.String[])

Scope Name

DownloaderApp.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

DownloaderApp

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

0

Main Method

System.Void  ::(System.String[])

Main IL Instruction Count

106

Main IL

call System.Boolean  ::() brtrue.s IL_0015: call System.Boolean System.Environment::get_UserInteractive() call System.Void  ::() leave.s IL_0014: ret pop <null> leave IL_0155: ret ret <null> call System.Boolean System.Environment::get_UserInteractive() brtrue.s IL_0027: ldc.i4 -1227018388 newobj System.Void  ::.ctor() call System.Void System.ServiceProcess.ServiceBase::Run(System.ServiceProcess.ServiceBase) ret <null> ldc.i4 -1227018388 call System.String  ::(System.Int32) stloc.2 <null> ldc.i4 -1227018381 call System.String  ::(System.Int32) stloc.3 <null> ldc.i4 -1227018406 call System.String  ::(System.Int32) stloc.s V_4 ldc.i4.s 36 call System.String System.Environment::GetFolderPath(System.Environment/SpecialFolder) dup <null> ldloc.2 <null> call System.String System.IO.Path::Combine(System.String,System.String) stloc.0 <null> ldloc.3 <null> call System.String System.IO.Path::Combine(System.String,System.String) stloc.1 <null> ldc.i4 -1227018462 call System.String  ::(System.Int32) ldloc.0 <null> call System.Void  ::(System.String,System.String) ldc.i4 -1227018494 call System.String  ::(System.Int32) ldloc.1 <null> call System.Void  ::(System.String,System.String) ldloc.0 <null> ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) ldloc.1 <null> ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) ldloc.0 <null> call System.Void  ::(System.String) ldloc.1 <null> call System.Void  ::(System.String) call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() callvirt System.String System.Reflection.Assembly::get_Location() call System.Void  ::(System.String) ldloc.0 <null> ldloc.s V_4 call System.Void  ::(System.String,System.String) newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() dup <null> ldc.i4 -1227018270 call System.String  ::(System.Int32) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) dup <null> ldc.i4 -1227018256 call System.String  ::(System.Int32) ldloc.0 <null> ldc.i4 -1227018300 call System.String  ::(System.Int32) call System.String System.String::Concat(System.String,System.String,System.String) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Arguments(System.String) dup <null> ldc.i4.0 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_CreateNoWindow(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_WindowStyle(System.Diagnostics.ProcessWindowStyle) call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() dup <null> ldc.i4 -1227018270 call System.String  ::(System.Int32) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) dup <null> ldc.i4 -1227018256 call System.String  ::(System.Int32) ldloc.1 <null> ldc.i4 -1227018300 call System.String  ::(System.Int32) call System.String System.String::Concat(System.String,System.String,System.String) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Arguments(System.String) dup <null> ldc.i4.0 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_CreateNoWindow(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_WindowStyle(System.Diagnostics.ProcessWindowStyle) call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> leave.s IL_0155: ret pop <null> leave.s IL_0155: ret ret <null>

159acf537580ca9d5562978f5cb29c57 (2.63 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
1NmmrArzWY05.Xvywujd7.ros
NV7t4xj.bat
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
STRING
ID:07D1
ID:4
ID:7
ID:9
ID:10
ID:12
ID:1028
ID:1040
ID:07D2
ID:4
ID:7
ID:9
ID:10
ID:12
ID:1028
ID:1040
ID:07D3
ID:4
ID:7
ID:9
ID:10
ID:12
ID:1028
ID:1040
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0008
ID:0
ID:0-preview.png
RT_DIALOG
ID:0069
ID:0
ID:0084
ID:0
RT_GROUP_CURSOR4
ID:07D0
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:1033
ID:1033-preview.png
ID:0066
ID:1033
ID:1033-preview.png
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
RT_MANIFEST
ID:0001
ID:1033
​  ​     
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙