Suspicious
Suspect

1759675620537ad9d2f477ce78704a48

PE Executable
|
MD5: 1759675620537ad9d2f477ce78704a48
|
Size: 66.05 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Very high

Hash
Hash Value
MD5
1759675620537ad9d2f477ce78704a48
Sha1
7716a3eecb203ff9bc9022d166f073c0eed367b7
Sha256
84e03eb7665a140b8769ba72fd95fa497190682e61eef78d6f6ebcacca3867ff
Sha384
b52e30016a8e115ad9bd4d42a0f9edbddb298352822ef492e33214480aab9b5533286834acf7a1b02e79b77e74dbe187
Sha512
ff9cf615926872f3447fc86e8334db86f5ce6aaaf89e883919190baf3198462e9eb9ffbb4f3cabe27a8b677dfb1e78f38d582d4b1b8bd40c6c22787e83648fc4
SSDeep
768:gQJdeAd+qFj618aTpCZzSdpUtS1N9Orc9bjyiQpxXdrMQ6rwS+:gwdLsqF61TTpCZmdpUtuj9beimdwI
TLSH
9C53B9943673CC32D17EAE76E6C3624F9DB15173AC05D5860CD666E23F02E86C90A8F6

PeID

Microsoft Visual C++ DLL
Microsoft Visual C++ v6.0
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

AgyfUDHCkhurks34f0vL

Full Name

AgyfUDHCkhurks34f0vL

EntryPoint

System.Void hvceA3q97Bsf3upNRTMg.Y8B7ENgG2ekd6PdSbcIi::OI8z5ZECq6Btp1KItEam()

Scope Name

AgyfUDHCkhurks34f0vL

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

he

Assembly Version

7.20.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

332

Main Method

System.Void hvceA3q97Bsf3upNRTMg.Y8B7ENgG2ekd6PdSbcIi::OI8z5ZECq6Btp1KItEam()

Main IL Instruction Count

31

Main IL

ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Void KyH0GSG6DMriKkvtz0aT.KEyFKYkQje9kQSBJnyMh::dXhjg0WFBYlIDvX0Z2Tg() call System.Boolean GNY6UQiYfA6Y3d2oidsu.DmXmanmImH8XM1q2W9Kw::UeeGUQARvXJ8sg2jnw2S() brtrue IL_001F: call System.Boolean XUmGdBhXYRPNpBn2zVhG.3cmELWRMMZNI283PT0p1::VJBqpox3M9RV93CMIxgS() ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) call System.Boolean XUmGdBhXYRPNpBn2zVhG.3cmELWRMMZNI283PT0p1::VJBqpox3M9RV93CMIxgS() brtrue IL_002E: call System.Object XUmGdBhXYRPNpBn2zVhG.3cmELWRMMZNI283PT0p1::rk1pr6Dx974kJqf0YNiC() call System.Void XUmGdBhXYRPNpBn2zVhG.3cmELWRMMZNI283PT0p1::1eb4J9Sc7BxbungcXqqd() call System.Object XUmGdBhXYRPNpBn2zVhG.3cmELWRMMZNI283PT0p1::rk1pr6Dx974kJqf0YNiC() call System.Object Microsoft.VisualBasic.CompilerServices.Operators::NotObject(System.Object) call System.Boolean Microsoft.VisualBasic.CompilerServices.Conversions::ToBoolean(System.Object) brfalse IL_0047: leave IL_005D call System.Void XUmGdBhXYRPNpBn2zVhG.3cmELWRMMZNI283PT0p1::XpfiKZHbYU9HTsAf9R64() leave IL_005D: ldnull dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.1 <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave IL_005D: ldnull ldnull <null> ldftn System.Void hvceA3q97Bsf3upNRTMg.Y8B7ENgG2ekd6PdSbcIi::njGtRPJNQ6bfL31PABBe() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) stloc.0 <null> ldloc.0 <null> callvirt System.Void System.Threading.Thread::Start() ldloc.0 <null> callvirt System.Void System.Threading.Thread::Join() ret <null>

1759675620537ad9d2f477ce78704a48 (66.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙