2ada51cd951b376c00aa6a04e9e235e6
PE Executable | MD5: 2ada51cd951b376c00aa6a04e9e235e6 | Size: 385.02 KB | application/x-dosexec
Symbol Obfuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 2ada51cd951b376c00aa6a04e9e235e6
|
| Sha1 | 6a1057ebdb35787d03e84fb411c5b3191aced454
|
| Sha256 | 56a559138d702c729ae3f18b1708fb3686d859ec1252aed66eb14ab3530a2e8a
|
| Sha384 | c1a18bee06e08df3a56ee8648612a7cfa3eb2ba045dd7faf0de0fca214327859e0d5b7b900a54beb2da73b2d50c8c47d
|
| Sha512 | ffa35da9e6824940c923ad896cd8ae36cd2c17351ee01a0ad84b9d0637403bab3b0534a1bbe0147c8dd3f3832b53bea01c359aaecbed72d94f48e8f0d657c527
|
| SSDeep | 6144:OfqQ4i1FFiEKAwpbYCGz7nLz06bx4owfah8TblNMt31CYq:IpliVbYpn8C4owfaSdNMt31CYq
|
| TLSH | AD849C1333A8D93BD1FE173AF4360A184BB1D457B616F38B5A5A55B82D233868D903B3
|
PeID
|
Config. Field0 | Value |
|---|---|
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Port | 34. |
| Host | 34. |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Version | 1.3.0.0 |
| Port | 434 |
| Host | windows10-11.duckdns.org |
| ReconnectDelay | 2999 |
| Key | oXCnUiPgBL0sy3Tlv+F8LQ== |
| AuthKey | h36LUNE6D6Y9hpohEF6YNS5bniF/Glgol+St+nwGv2QBfXWLmUsLx5aanXm2PRFz2aY54a//jMvBGR9l4hF9Vg== |
| SubDirectory | up |
| InstallName | jstat.exe |
| Install | 0 |
| Startup | 0 |
| Mutex | QSR_MUTEX_wizqga |
| StartupKey | Windows Protecte |
| HideFile | 1 |
| EnableLogger | 1 |
| Tag | Kanjal |
| LogDirectory | ogl |
| HideLogDirectory | 0 |
| HideLogSubdirectory | 1 |
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader FAIL, AsmResolver Mapped OK |
| Info | Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_9e3fd28f.exe |
| Module Name | Client.exe |
| Full Name | Client.exe |
| EntryPoint | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Scope Name | Client.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Client |
| Assembly Version | 1.3.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.0,Profile=Client |
| Total Strings | 896 |
| Main Method | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Main IL Instruction Count | 19 |
| Main IL | call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null> |
| Module Name | Client.exe |
| Full Name | Client.exe |
| EntryPoint | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Scope Name | Client.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Client |
| Assembly Version | 1.3.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.0,Profile=Client |
| Total Strings | 896 |
| Main Method | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Main IL Instruction Count | 19 |
| Main IL | call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null> |
|
Name0 | Value |
|---|---|
| CnC | windows10-11.duckdns.org |
| Port | 434 |
| CnC | 34. |
| Port | 34. |
| PE Layout | MemoryMapped (process dump suspected) |
| CnC | windows10-11.duckdns.org |
| Port | 434 |
| CnC | 34. |
| Port | 34. |
| PE Layout | MemoryMapped (process dump suspected) |
|
Config. Field0 | Value |
|---|---|
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Port | 34. |
| Host | 34. |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Version | 1.3.0.0 |
| Port | 434 |
| Host | windows10-11.duckdns.org |
| ReconnectDelay | 2999 |
| Key | oXCnUiPgBL0sy3Tlv+F8LQ== |
| AuthKey | h36LUNE6D6Y9hpohEF6YNS5bniF/Glgol+St+nwGv2QBfXWLmUsLx5aanXm2PRFz2aY54a//jMvBGR9l4hF9Vg== |
| SubDirectory | up |
| InstallName | jstat.exe |
| Install | 0 |
| Startup | 0 |
| Mutex | QSR_MUTEX_wizqga |
| StartupKey | Windows Protecte |
| HideFile | 1 |
| EnableLogger | 1 |
| Tag | Kanjal |
| LogDirectory | ogl |
| HideLogDirectory | 0 |
| HideLogSubdirectory | 1 |
|
Name0 | Value | Location |
|---|---|---|
| CnC | windows10-11.duckdns.org Malicious |
2ada51cd951b376c00aa6a04e9e235e6 |
| Port | 434 Malicious |
2ada51cd951b376c00aa6a04e9e235e6 |
| CnC | 34. Malicious |
2ada51cd951b376c00aa6a04e9e235e6 |
| Port | 34. Malicious |
2ada51cd951b376c00aa6a04e9e235e6 |
| PE Layout | MemoryMapped (process dump suspected) |
2ada51cd951b376c00aa6a04e9e235e6 |
| CnC | windows10-11.duckdns.org Malicious |
2ada51cd951b376c00aa6a04e9e235e6 > [Rebuild from dump]_9e3fd28f.exe |
| Port | 434 Malicious |
2ada51cd951b376c00aa6a04e9e235e6 > [Rebuild from dump]_9e3fd28f.exe |
| CnC | 34. Malicious |
2ada51cd951b376c00aa6a04e9e235e6 > [Rebuild from dump]_9e3fd28f.exe |
| Port | 34. Malicious |
2ada51cd951b376c00aa6a04e9e235e6 > [Rebuild from dump]_9e3fd28f.exe |
| PE Layout | MemoryMapped (process dump suspected) |
2ada51cd951b376c00aa6a04e9e235e6 > [Rebuild from dump]_9e3fd28f.exe |