Suspicious
Suspect

31e15dbeff16b38c41b95bb2efae573d

PE Executable
|
MD5: 31e15dbeff16b38c41b95bb2efae573d
|
Size: 129.54 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
31e15dbeff16b38c41b95bb2efae573d
Sha1
a23b27916fa8f7475c978598402679f30bd1f2c2
Sha256
2d44c881f998667c46273f4dda60b479750467ac786c6246e7cace310a6fc98e
Sha384
a003c88011316c9ef9195cf0890722542dd9e428af22ca36b11040f6e904a88d79d6352e73e39d30fcc66666f5a9806e
Sha512
c8f98bfcb236fbb1b4f863f836c223229c2f56c1698ddc1948b805091a0b474bfad35128a9fae1609cc8c27edb1961145418c4cfb1a16b97b2eaf39c2d9ac09c
SSDeep
1536:Ie0df/3gjw/ZqltQYBBJn0tmHpnqDkci9ENezznFNt4CW2+:Ie0dH3QwElVBJnyNDDioqt4CW2+
TLSH
B4C33A62DE989101EA1A1F34E0EA7576072E3D307DA3AF4FAC54319427B32C4A5199FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

Canva.exe

Full Name

Canva.exe

EntryPoint

System.Int32 <Module>::Main(System.String[])

Scope Name

Canva.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Canva

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

1

Main Method

System.Int32 <Module>::Main(System.String[])

Main IL Instruction Count

103

Main IL

ldc.i4 11898 pop <null> ldc.i4 11898 newarr System.UInt32 dup <null> ldtoken <Module>/DataType <Module>::DataField call System.Void System.Runtime.CompilerServices.RuntimeHelpers::InitializeArray(System.Array,System.RuntimeFieldHandle) stloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() stloc.1 <null> ldloc.1 <null> callvirt System.Reflection.Module System.Reflection.Assembly::get_ManifestModule() stloc.2 <null> ldloc.0 <null> ldc.i4 388134224 call System.Runtime.InteropServices.GCHandle <Module>::Decrypt(System.UInt32[],System.UInt32) stloc.3 <null> ldloca.s V_3 call System.Object System.Runtime.InteropServices.GCHandle::get_Target() castclass System.Byte[] stloc.s V_4 ldloc.1 <null> ldstr koi ldloc.s V_4 callvirt System.Reflection.Module System.Reflection.Assembly::LoadModule(System.String,System.Byte[]) stloc.s V_5 ldloc.s V_4 ldc.i4.0 <null> ldloc.s V_4 ldlen <null> conv.i4 <null> call System.Void System.Array::Clear(System.Array,System.Int32,System.Int32) ldloca.s V_3 call System.Void System.Runtime.InteropServices.GCHandle::Free() ldloc.0 <null> ldc.i4.0 <null> ldloc.0 <null> ldlen <null> conv.i4 <null> call System.Void System.Array::Clear(System.Array,System.Int32,System.Int32) ldloc.2 <null> ldc.i4 285212673 callvirt System.Byte[] System.Reflection.Module::ResolveSignature(System.Int32) stsfld System.Byte[] <Module>::key call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Reflection.Assembly <Module>::Resolve(System.Object,System.ResolveEventArgs) newobj System.Void System.ResolveEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_AssemblyResolve(System.ResolveEventHandler) ldloc.s V_5 callvirt System.Type[] System.Reflection.Module::GetTypes() pop <null> ldloc.s V_5 ldsfld System.Byte[] <Module>::key ldc.i4.0 <null> ldelem.u1 <null> ldsfld System.Byte[] <Module>::key ldc.i4.1 <null> ldelem.u1 <null> ldc.i4.8 <null> shl <null> or <null> ldsfld System.Byte[] <Module>::key ldc.i4.2 <null> ldelem.u1 <null> ldc.i4.s 16 shl <null> or <null> ldsfld System.Byte[] <Module>::key ldc.i4.3 <null> ldelem.u1 <null> ldc.i4.s 24 shl <null> or <null> callvirt System.Reflection.MethodBase System.Reflection.Module::ResolveMethod(System.Int32) stloc.s V_6 ldloc.s V_6 callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldlen <null> conv.i4 <null> brfalse.s IL_00E8: ldloc.s V_6 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_6 ldnull <null> ldloc.s V_7 callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_8 ldloc.s V_8 isinst System.Int32 brfalse.s IL_0105: ldc.i4.0 ldloc.s V_8 unbox.any System.Int32 ret <null> ldc.i4.0 <null> ret <null>

Module Name

Canva.exe

Full Name

Canva.exe

EntryPoint

System.Int32 <Module>::Main(System.String[])

Scope Name

Canva.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Canva

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

1

Main Method

System.Int32 <Module>::Main(System.String[])

Main IL Instruction Count

103

Main IL

ldc.i4 11898 pop <null> ldc.i4 11898 newarr System.UInt32 dup <null> ldtoken <Module>/DataType <Module>::DataField call System.Void System.Runtime.CompilerServices.RuntimeHelpers::InitializeArray(System.Array,System.RuntimeFieldHandle) stloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() stloc.1 <null> ldloc.1 <null> callvirt System.Reflection.Module System.Reflection.Assembly::get_ManifestModule() stloc.2 <null> ldloc.0 <null> ldc.i4 388134224 call System.Runtime.InteropServices.GCHandle <Module>::Decrypt(System.UInt32[],System.UInt32) stloc.3 <null> ldloca.s V_3 call System.Object System.Runtime.InteropServices.GCHandle::get_Target() castclass System.Byte[] stloc.s V_4 ldloc.1 <null> ldstr koi ldloc.s V_4 callvirt System.Reflection.Module System.Reflection.Assembly::LoadModule(System.String,System.Byte[]) stloc.s V_5 ldloc.s V_4 ldc.i4.0 <null> ldloc.s V_4 ldlen <null> conv.i4 <null> call System.Void System.Array::Clear(System.Array,System.Int32,System.Int32) ldloca.s V_3 call System.Void System.Runtime.InteropServices.GCHandle::Free() ldloc.0 <null> ldc.i4.0 <null> ldloc.0 <null> ldlen <null> conv.i4 <null> call System.Void System.Array::Clear(System.Array,System.Int32,System.Int32) ldloc.2 <null> ldc.i4 285212673 callvirt System.Byte[] System.Reflection.Module::ResolveSignature(System.Int32) stsfld System.Byte[] <Module>::key call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Reflection.Assembly <Module>::Resolve(System.Object,System.ResolveEventArgs) newobj System.Void System.ResolveEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_AssemblyResolve(System.ResolveEventHandler) ldloc.s V_5 callvirt System.Type[] System.Reflection.Module::GetTypes() pop <null> ldloc.s V_5 ldsfld System.Byte[] <Module>::key ldc.i4.0 <null> ldelem.u1 <null> ldsfld System.Byte[] <Module>::key ldc.i4.1 <null> ldelem.u1 <null> ldc.i4.8 <null> shl <null> or <null> ldsfld System.Byte[] <Module>::key ldc.i4.2 <null> ldelem.u1 <null> ldc.i4.s 16 shl <null> or <null> ldsfld System.Byte[] <Module>::key ldc.i4.3 <null> ldelem.u1 <null> ldc.i4.s 24 shl <null> or <null> callvirt System.Reflection.MethodBase System.Reflection.Module::ResolveMethod(System.Int32) stloc.s V_6 ldloc.s V_6 callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldlen <null> conv.i4 <null> brfalse.s IL_00E8: ldloc.s V_6 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_6 ldnull <null> ldloc.s V_7 callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_8 ldloc.s V_8 isinst System.Int32 brfalse.s IL_0105: ldc.i4.0 ldloc.s V_8 unbox.any System.Int32 ret <null> ldc.i4.0 <null> ret <null>

31e15dbeff16b38c41b95bb2efae573d (129.54 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙