19168628d7b2c76814a3889e42e0858c
PE Executable | MD5: 19168628d7b2c76814a3889e42e0858c | Size: 24.06 KB | application/x-dosexec
Symbol Obfuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 19168628d7b2c76814a3889e42e0858c
|
| Sha1 | ad6f4ab92a7b0a381d71d64d2fffbcbf546239be
|
| Sha256 | 2c4c5c35e5777c563006243dba89b1e6dbf977f4171cf36eb24aa4a08803759b
|
| Sha384 | 8eb043417e51edccf5668d7205573559a6b25532be3501c0b42d644e509751a2cc2f0f9388aa5d43f129a11b9e37327c
|
| Sha512 | 88bba3aba7c664b17290c5d72236d29fa2380c2e0355ecf825d4b0a249068798b52e051b4cd1d7ace3a1596887b62d3de66777626b97fb129ee48976df9c08ad
|
| SSDeep | 384:yluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZmc:lOmhtIiRpcnuM
|
| TLSH | 20B2194E3FA98866C5BC07748AA5965003B491870423EF2FCDC554CBAFB36D92D4CAF9
|
PeID
|
Config. Field0 | Value |
|---|---|
| victim_name [VN] | HacKed |
| version [VR] | 0.7d |
| executable_name [EXE] | svchost.exe |
| directory [DR] | AppData |
| reg_key [RG] | 83db3ff25348b04831a188c2c754ee0d |
| cnc_host [H] | al-touring.gl.at.ply.gg |
| cnc_port [P] | 32744 |
| splitter [Y] | |'|'| |
| BD [BD] | True |
| is_dir_defined [Idr] | True |
| is_startup_folder [IsF] | True |
| is_user_reg [Isu] | True |
| reg_path [sf] | Software\Microsoft\Windows\CurrentVersion\Run |
| packet_size [b] | 5121 |
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Module Name | j.exe |
| Full Name | j.exe |
| EntryPoint | System.Void j.A::main() |
| Scope Name | j.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v2.0.50727 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | j |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 214 |
| Main Method | System.Void j.A::main() |
| Main IL Instruction Count | 2 |
| Main IL | call System.Void j.OK::ko() ret <null> |
| Module Name | j.exe |
| Full Name | j.exe |
| EntryPoint | System.Void j.A::main() |
| Scope Name | j.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v2.0.50727 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | j |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 214 |
| Main Method | System.Void j.A::main() |
| Main IL Instruction Count | 2 |
| Main IL | call System.Void j.OK::ko() ret <null> |
|
Name0 | Value |
|---|---|
| CnC | al-touring.gl.at.ply.gg |
| Port | 32744 |
|
Config. Field0 | Value |
|---|---|
| victim_name [VN] | HacKed |
| version [VR] | 0.7d |
| executable_name [EXE] | svchost.exe |
| directory [DR] | AppData |
| reg_key [RG] | 83db3ff25348b04831a188c2c754ee0d |
| cnc_host [H] | al-touring.gl.at.ply.gg |
| cnc_port [P] | 32744 |
| splitter [Y] | |'|'| |
| BD [BD] | True |
| is_dir_defined [Idr] | True |
| is_startup_folder [IsF] | True |
| is_user_reg [Isu] | True |
| reg_path [sf] | Software\Microsoft\Windows\CurrentVersion\Run |
| packet_size [b] | 5121 |
|
Name0 | Value | Location |
|---|---|---|
| CnC | al-touring.gl.at.ply.gg Malicious |
19168628d7b2c76814a3889e42e0858c |
| Port | 32744 Malicious |
19168628d7b2c76814a3889e42e0858c |