Suspicious
Suspect

1f8715d769b879769fa4c65a2c9a9467

PE Executable
|
MD5: 1f8715d769b879769fa4c65a2c9a9467
|
Size: 1.11 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
1f8715d769b879769fa4c65a2c9a9467
Sha1
3a76adca3539964ce581e3f969cb17e446a8a09b
Sha256
3c97c9c3fd33f0deafc90dac2192ca8a44a44732368e02fdafbf35da539091aa
Sha384
c5a151897ee15a8d9a63789ec6ceb6f9b7fe6efd84adb89d5c81f3fe740dc9a96808b2b6d161578a65fa8cd85b244b6b
Sha512
a509c3a074aa679be99480ae9397449c6bfdf49025a46c598e15008f250943fa11ed4a39bf2dccf959cb4e79a6dedde258f52fbd757b6fae7adacc7b85987673
SSDeep
24576:XCZal6DRKKSeuqFp8ilnpdgny6acGW07lVSKQ:JodKKV7lyZmlVB
TLSH
9135120DB76ABE20CB684B77C413120C51F68597E633F3AA5AD61CE50D79B49C80EAC7

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

bdXsr.exe

Full Name

bdXsr.exe

EntryPoint

System.Void BlindSimulator.Program::Main()

Scope Name

bdXsr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

bdXsr

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void BlindSimulator.Program::Main()

Main IL Instruction Count

39

Main IL

ldsfld System.Int32[] <PrivateImplementationDetails>::Ⴈ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BlindSimulator.Form1::Ⴅ() ldc.i4 708 ldc.i4 678 call System.Void BlindSimulator.WuZhangAiJieGuo::Ⴄ(System.Char,System.Int16) ldc.i4.0 <null> ldc.i4.s 78 ldc.i4.s 28 call System.Void BlindSimulator.Form4::Ⴀ(System.Boolean,System.Int32,System.Int32) ldloc.2 <null> ldc.i4.s 98 ldelem.i4 <null> ldc.i4 54067 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void BlindSimulator.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldsfld System.Byte[] BlindSimulator.Form2::Ⴍ ldc.i4 372 ldsfld System.Byte[] BlindSimulator.Form2::Ⴍ ldc.i4 372 ldelem.u1 <null> ldsfld System.Byte[] BlindSimulator.Form2::Ⴍ ldc.i4 199 ldelem.u1 <null> or <null> ldc.i4.s 85 and <null> stelem.i1 <null> ret <null> ldtoken System.Void BlindSimulator.Program::Main() pop <null> ret <null>

Module Name

bdXsr.exe

Full Name

bdXsr.exe

EntryPoint

System.Void BlindSimulator.Program::Main()

Scope Name

bdXsr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

bdXsr

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void BlindSimulator.Program::Main()

Main IL Instruction Count

39

Main IL

ldsfld System.Int32[] <PrivateImplementationDetails>::Ⴈ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BlindSimulator.Form1::Ⴅ() ldc.i4 708 ldc.i4 678 call System.Void BlindSimulator.WuZhangAiJieGuo::Ⴄ(System.Char,System.Int16) ldc.i4.0 <null> ldc.i4.s 78 ldc.i4.s 28 call System.Void BlindSimulator.Form4::Ⴀ(System.Boolean,System.Int32,System.Int32) ldloc.2 <null> ldc.i4.s 98 ldelem.i4 <null> ldc.i4 54067 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void BlindSimulator.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldsfld System.Byte[] BlindSimulator.Form2::Ⴍ ldc.i4 372 ldsfld System.Byte[] BlindSimulator.Form2::Ⴍ ldc.i4 372 ldelem.u1 <null> ldsfld System.Byte[] BlindSimulator.Form2::Ⴍ ldc.i4 199 ldelem.u1 <null> or <null> ldc.i4.s 85 and <null> stelem.i1 <null> ret <null> ldtoken System.Void BlindSimulator.Program::Main() pop <null> ret <null>

1f8715d769b879769fa4c65a2c9a9467 (1.11 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙