Malicious
Malicious

393c0c6cfd4efc84619776473d17388b

PE Executable
|
MD5: 393c0c6cfd4efc84619776473d17388b
|
Size: 76.8 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
393c0c6cfd4efc84619776473d17388b
Sha1
62f4b2bdbad4207ecc6202ce327c59b949fe15be
Sha256
444dca0bcda9d7e51e4c7cc5b6f9a5659570e8fe7ee4a12b96c7df612aea8cf5
Sha384
d960d4a66814edbfbf6a1ceab163ad961ac417341397bec74d1470887e2f4a1f3ec2f26fc6d5d545ede6a1553cc31ae5
Sha512
e827b7850f10faa02ef6bbbefa320b7a636430cec87ea219adf06d4b9d22903ac9fa23306088c3bdfc880bb16c72d8769a25f1ca96ec1d07cb316282a03c5f85
SSDeep
1536:gFREK6si3drGbbX/MVAG6+Q+yLlcOQ9nUVclN:g4K6si3hGbbXM/1GY
TLSH
A2737C0027998925E2AD4AF8BCF2464106B5D5B33112DB5EBCC404DB6B9FFC64A127FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

cEVGZFlSYUNLTVM5T0ZGZkRDWUlsbWNlMEhoUUhKcE4=

Pastebin

-

Certificate

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

ServerSignature

nCDtWdCZPIMhVj9N9G/JbxhJ8pU6fG0aBZ9S+wp3lkCS4KIKB6FTpEzSdJHk6tM0Ea0a5KsPYpNRRn3ptcOIkNpHmh3V3Yy0/e9K5kQYj1DhoJXsJj3m2jhkNgFrXS2hWPhSrysQmgABmzvEXeAaaxfGriwAcMscik2Cp4NUEIE=

Install

true

BDOS

false

Anti-VM

false

Install File

BetNexusControl.exe

Install-Folder

%AppData%

Hosts

meraki.uk.com,www.meraki.uk.com,addictiontreatment.eu.com,www.addictiontreatment.eu.com,gqa.uk.com,www.gqa.uk.com,wcw.uk.com,www.wcw.uk.com,ubwgpb.za.com,www.ubwgpb.za.com,pub88-game.com,www.pub88-game.com,kra.sa.com,www.kra.sa.com,riceif.in.net,www.riceif.in.net,win678.fun,www.win678.fun

Ports

80,443,1337,1604,4782,8080

Mutex

BetNexusControl_Master_aq78ak

Version

1.0.7

Delay

1

Group

Central Control

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

BetNexus Control.exe

Full Name

BetNexus Control.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

BetNexus Control.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BetNexus Control

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

BetNexus Control.exe

Full Name

BetNexus Control.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

BetNexus Control.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BetNexus Control

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

cEVGZFlSYUNLTVM5T0ZGZkRDWUlsbWNlMEhoUUhKcE4=

CnC

meraki.uk.com

CnC

www.meraki.uk.com

CnC

addictiontreatment.eu.com

CnC

www.addictiontreatment.eu.com

CnC

gqa.uk.com

CnC

www.gqa.uk.com

CnC

wcw.uk.com

CnC

www.wcw.uk.com

CnC

ubwgpb.za.com

CnC

www.ubwgpb.za.com

CnC

pub88-game.com

CnC

www.pub88-game.com

CnC

kra.sa.com

CnC

www.kra.sa.com

CnC

riceif.in.net

CnC

www.riceif.in.net

CnC

win678.fun

CnC

www.win678.fun

Ports

80

Ports

443

Ports

1337

Ports

1604

Ports

4782

Ports

8080

Mutex

BetNexusControl_Master_aq78ak

393c0c6cfd4efc84619776473d17388b (76.8 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

cEVGZFlSYUNLTVM5T0ZGZkRDWUlsbWNlMEhoUUhKcE4=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVAMbyED2na+OH1xQ+uln9I/KhvfvNMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDQxNjA4MTQ1MVoXDTM2MDEyNDA4MTQ1MVowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAK37p28hVa2PGGn9XyIGwP5XS39BZtIRqMqvoclDjgz6cncAAS4CBmhfVOPR6gsk4DLAl8U9sTatSk9k+8CtSYvPBISpT0b7dlwj7vnxaaXO2fdp1291FneWTRXQMWQ02vXHhWA0RFiyl0F8tClpxbRUvOqHiDBFTNS8RQyHSMQVAgMBAAGjMjAwMB0GA1UdDgQWBBSrnLSymbbnhMH/uZ9OcajIxGlUQDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAAlQ6BkY67vRVKCYFf4+Ft6p6Ke28sQFjRBn5sylxFRgKtF0YhCyv6TJJwL/qY3f+1fPJsxg4TgA6aKDaGnxYtV1+mV+QJMY9jxJ1W0LaKZcDUNX/NlQhCCZEEejwqy7HDcOqxYDXpHmS7+ciEihr2g0s3l2n9mOecykF8ocb8F8

ServerSignature

nCDtWdCZPIMhVj9N9G/JbxhJ8pU6fG0aBZ9S+wp3lkCS4KIKB6FTpEzSdJHk6tM0Ea0a5KsPYpNRRn3ptcOIkNpHmh3V3Yy0/e9K5kQYj1DhoJXsJj3m2jhkNgFrXS2hWPhSrysQmgABmzvEXeAaaxfGriwAcMscik2Cp4NUEIE=

Install

true

BDOS

false

Anti-VM

false

Install File

BetNexusControl.exe

Install-Folder

%AppData%

Hosts

meraki.uk.com,www.meraki.uk.com,addictiontreatment.eu.com,www.addictiontreatment.eu.com,gqa.uk.com,www.gqa.uk.com,wcw.uk.com,www.wcw.uk.com,ubwgpb.za.com,www.ubwgpb.za.com,pub88-game.com,www.pub88-game.com,kra.sa.com,www.kra.sa.com,riceif.in.net,www.riceif.in.net,win678.fun,www.win678.fun

Ports

80,443,1337,1604,4782,8080

Mutex

BetNexusControl_Master_aq78ak

Version

1.0.7

Delay

1

Group

Central Control

Artefacts
Name
Value Location
Key (AES_256)

cEVGZFlSYUNLTVM5T0ZGZkRDWUlsbWNlMEhoUUhKcE4=

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

meraki.uk.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.meraki.uk.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

addictiontreatment.eu.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.addictiontreatment.eu.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

gqa.uk.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.gqa.uk.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

wcw.uk.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.wcw.uk.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

ubwgpb.za.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.ubwgpb.za.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

pub88-game.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.pub88-game.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

kra.sa.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.kra.sa.com

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

riceif.in.net

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.riceif.in.net

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

win678.fun

Malicious

393c0c6cfd4efc84619776473d17388b

CnC

www.win678.fun

Malicious

393c0c6cfd4efc84619776473d17388b

Ports

80

Malicious

393c0c6cfd4efc84619776473d17388b

Ports

443

Malicious

393c0c6cfd4efc84619776473d17388b

Ports

1337

Malicious

393c0c6cfd4efc84619776473d17388b

Ports

1604

Malicious

393c0c6cfd4efc84619776473d17388b

Ports

4782

Malicious

393c0c6cfd4efc84619776473d17388b

Ports

8080

Malicious

393c0c6cfd4efc84619776473d17388b

Mutex

BetNexusControl_Master_aq78ak

Malicious

393c0c6cfd4efc84619776473d17388b

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙