Malicious
Malicious

199ec2b9b635e4c1b2b6c469a294585e

PE Executable
|
MD5: 199ec2b9b635e4c1b2b6c469a294585e
|
Size: 133.63 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
199ec2b9b635e4c1b2b6c469a294585e
Sha1
cd998f729cd486eb441beb9d8d7787491e13f8dc
Sha256
e4a07b7d015da2bca35cc5af0b33ae0e388d3756b3e46ac9ad897a6ea6315f7e
Sha384
5d6b82ebaae50b1ac5826d058bd7da1f2682db6a1f5c0e1c28ad0bfcbbc3847d532a6b0c3635241a4203df7bc29a26f0
Sha512
6b4554008ced2e1007aa9734961a23231efb7a5e4f7b03b208f4f32e74e14aa593a1386a10b85a550283a0d1e2a84643fe322d104888965c71ca287249644910
SSDeep
1536:4mo7B3r0uMED/L1mGbbpLzKB7GPGugehG/YVclN:nKrdrDDwGbbp6BfugSG/iY
TLSH
D2D30605378CC851EDED0BB4BFA2950D02759D27E50AF6CE7CC431CB56FABC585222AA

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

YjdHYm1DMW51amdZbXc3clhYQU9GTjk0bkVEYVBmN0E=

Pastebin

-

Certificate

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

ServerSignature

GhhJWWQQn8h3UBsKq0MciiqwcuU6lb851xl80halLoxWVr1yzzZ/1H1KShsUhSQkOBxntab3sFe7TbvMYXAECCQrrOZcdDMuT9PL/gMLLpo7eSG/Z4kK1gneA0+tHgFWVJ+YqnmBajsahR+iUDRIe7XRH6YF2dZ9H2gyne5JRgI=

Install

true

BDOS

false

Anti-VM

false

Install File

wininstall.exe

Install-Folder

%AppData%

Hosts

da88.in.net,www.da88.in.net

Ports

80,443,2053,2083,2087,2096,4782,8080,8848,8888

Mutex

TSCC_ImperiumStrategic_TitanLock_1j2k3l4m

Version

1.0.7

Delay

1

Group

Horizon

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

wininstall.exe

Full Name

wininstall.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

wininstall.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

wininstall

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

wininstall.exe

Full Name

wininstall.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

wininstall.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

wininstall

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

YjdHYm1DMW51amdZbXc3clhYQU9GTjk0bkVEYVBmN0E=

CnC

da88.in.net

CnC

www.da88.in.net

Ports

80

Ports

443

Ports

2053

Ports

2083

Ports

2087

Ports

2096

Ports

4782

Ports

8080

Ports

8848

Ports

8888

Mutex

TSCC_ImperiumStrategic_TitanLock_1j2k3l4m

199ec2b9b635e4c1b2b6c469a294585e (133.63 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

YjdHYm1DMW51amdZbXc3clhYQU9GTjk0bkVEYVBmN0E=

Pastebin

-

Certificate

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

ServerSignature

GhhJWWQQn8h3UBsKq0MciiqwcuU6lb851xl80halLoxWVr1yzzZ/1H1KShsUhSQkOBxntab3sFe7TbvMYXAECCQrrOZcdDMuT9PL/gMLLpo7eSG/Z4kK1gneA0+tHgFWVJ+YqnmBajsahR+iUDRIe7XRH6YF2dZ9H2gyne5JRgI=

Install

true

BDOS

false

Anti-VM

false

Install File

wininstall.exe

Install-Folder

%AppData%

Hosts

da88.in.net,www.da88.in.net

Ports

80,443,2053,2083,2087,2096,4782,8080,8848,8888

Mutex

TSCC_ImperiumStrategic_TitanLock_1j2k3l4m

Version

1.0.7

Delay

1

Group

Horizon

Artefacts
Name
Value Location
Key (AES_256)

YjdHYm1DMW51amdZbXc3clhYQU9GTjk0bkVEYVBmN0E=

Malicious

199ec2b9b635e4c1b2b6c469a294585e

CnC

da88.in.net

Malicious

199ec2b9b635e4c1b2b6c469a294585e

CnC

www.da88.in.net

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

80

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

443

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

2053

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

2083

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

2087

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

2096

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

4782

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

8080

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

8848

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Ports

8888

Malicious

199ec2b9b635e4c1b2b6c469a294585e

Mutex

TSCC_ImperiumStrategic_TitanLock_1j2k3l4m

Malicious

199ec2b9b635e4c1b2b6c469a294585e

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙