Malicious
Malicious

1734941c7db71d26bc131dea28a8a183

PE Executable
|
MD5: 1734941c7db71d26bc131dea28a8a183
|
Size: 63.49 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
1734941c7db71d26bc131dea28a8a183
Sha1
84119b71a303d297679f0e618e7012e6086c8159
Sha256
906b48a6e50edeb27678fc47e419fe8be24dce6b3c73edaa28acd96fd488189b
Sha384
a77df82a76fe9fbe49114d467fb2e897ed3ed624c562239c08ecb0c69d0e4984912024ee8186de0786bf0bbf0acd6bbc
Sha512
cced75da2ebf5c3ff2c7f7007e1340add5f20daab654b50fcb16c9611828da9a4dabbe3779d677b5a7fc45628a376fe90593eaf79751c5818b99dcc305a364e3
SSDeep
1536:ajT7Kqibw7q5xBibU5plvnLEQZv493WIx:ajT7Kqibwm5xBibU9vnLF03Fx
TLSH
FE53E8003BE9C525F2BE9F745EF6A55006B9F5A76A06D50E0CC441CA0A32BC69D42BFF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

dU9EVjRLbFQ2WnVKU0N3NThPUEJ6YjZmaUE0WDdzYWo=

Pastebin

-

Certificate

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

ServerSignature

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

Install

false

BDOS

false

Anti-VM

true

Install-Folder

%AppData%

Hosts

tmt.ydns.eu

Ports

31202,31203

Mutex

AsyncMutex_TMMYT6SI8OkPnk

Group

A 12

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

tmt.exe

Full Name

tmt.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

tmt.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

tmt

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

348

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

78

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0043: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0057: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() call System.Void Client.Helper.Methods::PreventSleep() ldnull <null> ldftn System.Void Client.Helper.Methods::LastAct() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) callvirt System.Void System.Threading.Thread::Start() ldsfld System.String Client.Settings::offlineKL call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00C9: ldsfld System.String Client.Settings::clipper ldnull <null> ldftn System.Void Client.Helper.LimeLogger::callk() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) callvirt System.Void System.Threading.Thread::Start() ldsfld System.String Client.Settings::clipper call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0104: leave IL_010F ldsfld System.Threading.ThreadStart Client.Program/<>c::<>9__1_0 dup <null> brtrue IL_00FA: newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) pop <null> ldsfld Client.Program/<>c Client.Program/<>c::<>9 ldftn System.Void Client.Program/<>c::<Main>b__1_0() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Threading.ThreadStart Client.Program/<>c::<>9__1_0 newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) call System.Void System.Threading.Thread::Start() leave IL_010F: nop pop <null> leave IL_010F: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0124: leave IL_012F call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_012F: ldc.i4 5000 pop <null> leave IL_012F: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_010F: nop

Module Name

tmt.exe

Full Name

tmt.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

tmt.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

tmt

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

348

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

78

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0043: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0057: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() call System.Void Client.Helper.Methods::PreventSleep() ldnull <null> ldftn System.Void Client.Helper.Methods::LastAct() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) callvirt System.Void System.Threading.Thread::Start() ldsfld System.String Client.Settings::offlineKL call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00C9: ldsfld System.String Client.Settings::clipper ldnull <null> ldftn System.Void Client.Helper.LimeLogger::callk() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) callvirt System.Void System.Threading.Thread::Start() ldsfld System.String Client.Settings::clipper call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0104: leave IL_010F ldsfld System.Threading.ThreadStart Client.Program/<>c::<>9__1_0 dup <null> brtrue IL_00FA: newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) pop <null> ldsfld Client.Program/<>c Client.Program/<>c::<>9 ldftn System.Void Client.Program/<>c::<Main>b__1_0() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Threading.ThreadStart Client.Program/<>c::<>9__1_0 newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) call System.Void System.Threading.Thread::Start() leave IL_010F: nop pop <null> leave IL_010F: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0124: leave IL_012F call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_012F: ldc.i4 5000 pop <null> leave IL_012F: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_010F: nop

Artefacts
Name
Value
Key (AES_256)

dU9EVjRLbFQ2WnVKU0N3NThPUEJ6YjZmaUE0WDdzYWo=

CnC

tmt.ydns.eu

Ports

31202

Ports

31203

Mutex

AsyncMutex_TMMYT6SI8OkPnk

1734941c7db71d26bc131dea28a8a183 (63.49 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

dU9EVjRLbFQ2WnVKU0N3NThPUEJ6YjZmaUE0WDdzYWo=

Pastebin

-

Certificate

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

ServerSignature

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

Install

false

BDOS

false

Anti-VM

true

Install-Folder

%AppData%

Hosts

tmt.ydns.eu

Ports

31202,31203

Mutex

AsyncMutex_TMMYT6SI8OkPnk

Group

A 12

Artefacts
Name
Value Location
Key (AES_256)

dU9EVjRLbFQ2WnVKU0N3NThPUEJ6YjZmaUE0WDdzYWo=

Malicious

1734941c7db71d26bc131dea28a8a183

CnC

tmt.ydns.eu

Malicious

1734941c7db71d26bc131dea28a8a183

Ports

31202

Malicious

1734941c7db71d26bc131dea28a8a183

Ports

31203

Malicious

1734941c7db71d26bc131dea28a8a183

Mutex

AsyncMutex_TMMYT6SI8OkPnk

Malicious

1734941c7db71d26bc131dea28a8a183

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙