Suspicious
Suspect

2b774e367a8b5fe2b559ce7d247fea98

PE Executable
|
MD5: 2b774e367a8b5fe2b559ce7d247fea98
|
Size: 169.98 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
2b774e367a8b5fe2b559ce7d247fea98
Sha1
e90630d5bf51a54b56334ccfe23154a29c17f28d
Sha256
2381f61d5ada36de3f22577f1ae6837376aea8d70a02689385279ae82fa45490
Sha384
c7a32587099ab62ee72e799fabbae6aeca255315f2ff30f27aac2f7cf2d8ca07feea18922737d38f3ad0a82f6558fbc3
Sha512
874133d7ae8154eadb63f43023376cd86b1efe82516e8e4a964cf435e2e4b9340bc851b9e2a7dcd8adad9600b53c803302d85e454f99ccccba0af7f4534caba6
SSDeep
3072:sff1zj3L6wGs06Xq1TICtWsuP35zeVFmkZGvI5PWVAjK1UQjHin+wu:sff1D6wG2Xq1TLWsuPlom1A5PKAhS
TLSH
B0F3E18A37F86B3BD28E6B34609A07083B38D145E643F7AFAEE0859F1D42FD61D81551

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
VZXCHH66&&
Informations
Name
Value
Module Name

VZXCHH66.exe

Full Name

VZXCHH66.exe

EntryPoint

System.Void A.c1bbff548eb3b3f744ecb02a9ee146ff2::cbbe7a125e8dd932323fda45ce298cad9(System.String[])

Scope Name

VZXCHH66.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

VZXCHH66

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5.2

Total Strings

4

Main Method

System.Void A.c1bbff548eb3b3f744ecb02a9ee146ff2::cbbe7a125e8dd932323fda45ce298cad9(System.String[])

Main IL Instruction Count

77

Main IL

nop <null> ldc.i4.s 12 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) dup <null> pop <null> stloc.0 <null> ldc.i4 262184 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) dup <null> pop <null> stloc.1 <null> ldc.i4 262249 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) stloc.2 <null> call System.String A.c0062706c439d1732676120f255593f33::cc1aacab4ddf5c70df9588f4536e86998() dup <null> pop <null> ldc.i4 262274 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) call System.String A.c936e23dbe22f95e826b32add4443e77f::cc1aacab4ddf5c70df9588f4536e86998(System.String,System.String) stloc.3 <null> nop <null> ldloc.1 <null> call System.Byte[] A.cd2135180f87da1906104d033137b8058::cc1aacab4ddf5c70df9588f4536e86998(System.String) stloc.s V_4 ldloc.2 <null> call System.Byte[] A.cd2135180f87da1906104d033137b8058::cc1aacab4ddf5c70df9588f4536e86998(System.String) stloc.s V_5 ldloc.0 <null> ldloc.s V_4 ldloc.s V_5 call System.Byte[] A.c1bbff548eb3b3f744ecb02a9ee146ff2::cd8c4031d86d6bfca6abd527cd5480fd8(System.String,System.Byte[],System.Byte[]) dup <null> pop <null> stloc.s V_6 ldloc.s V_6 brfalse.s IL_006B: ldc.i4.s 20 ldloc.s V_6 ldlen <null> ldc.i4.s 16 call System.Int32 A.cf2dc609b1499225cdab1e39ba684617e::c1f0daab49e79c7023e20b20b04fc637c(System.Int32) cgt.un <null> br.s IL_0072: stloc.s V_7 ldc.i4.s 20 call System.Int32 A.cf2dc609b1499225cdab1e39ba684617e::c1f0daab49e79c7023e20b20b04fc637c(System.Int32) stloc.s V_7 ldloc.s V_7 brfalse.s IL_0085: nop nop <null> ldloc.3 <null> ldloc.s V_6 call System.Void VZXCHH66.GHSDGSDHSD::Execute(System.String,System.Byte[]) nop <null> nop <null> br.s IL_0097: nop nop <null> ldc.i4 262295 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) call System.Void A.ca8bb0f218306f13dca2da7f61374084e::cc1aacab4ddf5c70df9588f4536e86998(System.String) nop <null> nop <null> nop <null> leave.s IL_00BE: ret stloc.s V_8 nop <null> ldc.i4 262372 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) ldloc.s V_8 call System.String A.c40a67e80fcae910dffe15a7c68bfa6f8::ced5557d9cfda45bbda6389f8cfe9d11d(System.Object) dup <null> pop <null> call System.String A.ce59af0ac8c13c3f22fa199e4a0430df0::cc1aacab4ddf5c70df9588f4536e86998(System.String,System.String) call System.Void A.ca8bb0f218306f13dca2da7f61374084e::cc1aacab4ddf5c70df9588f4536e86998(System.String) nop <null> nop <null> leave.s IL_00BE: ret ret <null>

Module Name

VZXCHH66.exe

Full Name

VZXCHH66.exe

EntryPoint

System.Void A.c1bbff548eb3b3f744ecb02a9ee146ff2::cbbe7a125e8dd932323fda45ce298cad9(System.String[])

Scope Name

VZXCHH66.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

VZXCHH66

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5.2

Total Strings

4

Main Method

System.Void A.c1bbff548eb3b3f744ecb02a9ee146ff2::cbbe7a125e8dd932323fda45ce298cad9(System.String[])

Main IL Instruction Count

77

Main IL

nop <null> ldc.i4.s 12 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) dup <null> pop <null> stloc.0 <null> ldc.i4 262184 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) dup <null> pop <null> stloc.1 <null> ldc.i4 262249 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) stloc.2 <null> call System.String A.c0062706c439d1732676120f255593f33::cc1aacab4ddf5c70df9588f4536e86998() dup <null> pop <null> ldc.i4 262274 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) call System.String A.c936e23dbe22f95e826b32add4443e77f::cc1aacab4ddf5c70df9588f4536e86998(System.String,System.String) stloc.3 <null> nop <null> ldloc.1 <null> call System.Byte[] A.cd2135180f87da1906104d033137b8058::cc1aacab4ddf5c70df9588f4536e86998(System.String) stloc.s V_4 ldloc.2 <null> call System.Byte[] A.cd2135180f87da1906104d033137b8058::cc1aacab4ddf5c70df9588f4536e86998(System.String) stloc.s V_5 ldloc.0 <null> ldloc.s V_4 ldloc.s V_5 call System.Byte[] A.c1bbff548eb3b3f744ecb02a9ee146ff2::cd8c4031d86d6bfca6abd527cd5480fd8(System.String,System.Byte[],System.Byte[]) dup <null> pop <null> stloc.s V_6 ldloc.s V_6 brfalse.s IL_006B: ldc.i4.s 20 ldloc.s V_6 ldlen <null> ldc.i4.s 16 call System.Int32 A.cf2dc609b1499225cdab1e39ba684617e::c1f0daab49e79c7023e20b20b04fc637c(System.Int32) cgt.un <null> br.s IL_0072: stloc.s V_7 ldc.i4.s 20 call System.Int32 A.cf2dc609b1499225cdab1e39ba684617e::c1f0daab49e79c7023e20b20b04fc637c(System.Int32) stloc.s V_7 ldloc.s V_7 brfalse.s IL_0085: nop nop <null> ldloc.3 <null> ldloc.s V_6 call System.Void VZXCHH66.GHSDGSDHSD::Execute(System.String,System.Byte[]) nop <null> nop <null> br.s IL_0097: nop nop <null> ldc.i4 262295 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) call System.Void A.ca8bb0f218306f13dca2da7f61374084e::cc1aacab4ddf5c70df9588f4536e86998(System.String) nop <null> nop <null> nop <null> leave.s IL_00BE: ret stloc.s V_8 nop <null> ldc.i4 262372 call System.String A.c06b1e78b578b77d73d489614dde16f5a::c718fbd9889ef2629550d2d4abae48b78(System.Int32) ldloc.s V_8 call System.String A.c40a67e80fcae910dffe15a7c68bfa6f8::ced5557d9cfda45bbda6389f8cfe9d11d(System.Object) dup <null> pop <null> call System.String A.ce59af0ac8c13c3f22fa199e4a0430df0::cc1aacab4ddf5c70df9588f4536e86998(System.String,System.String) call System.Void A.ca8bb0f218306f13dca2da7f61374084e::cc1aacab4ddf5c70df9588f4536e86998(System.String) nop <null> nop <null> leave.s IL_00BE: ret ret <null>

Artefacts
Name
Value
Embedded Resources

1

Suspicious Type Names (1-2 chars)

0

2b774e367a8b5fe2b559ce7d247fea98 (169.98 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
VZXCHH66&&
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

1

2b774e367a8b5fe2b559ce7d247fea98

Suspicious Type Names (1-2 chars)

0

2b774e367a8b5fe2b559ce7d247fea98

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙