Suspicious
Suspect

3cf69ea6735a45953859d139b019fcb6

PE Executable
|
MD5: 3cf69ea6735a45953859d139b019fcb6
|
Size: 586.24 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
3cf69ea6735a45953859d139b019fcb6
Sha1
66555b8fd58f1e1575e59e7b7bd61052bf01aef9
Sha256
f4cf566d25dcc52bfbc988b8e0f5bc78b2bdc941142776f31e60b7e47b86e791
Sha384
c05b201647764463a225b11884b19cbda7f5aaf6cd1c54152d550eca783115bf4dd449b00b432876c5b92e62468726ab
Sha512
a896916782652e510dd9105f76bac85b9140359a1936f4d0711a124e427582e3822c23b6020caa1141d741521418aa35930951bd5a32e64f219a058ea4e663cd
SSDeep
12288:m9r+ZYoePwn9iDo2OKQ/aBwjDXGC1AcGOLYALgM9LCbANGo/WBBw+i:m9r+ZYoK2iDhQ/v/GAAJALgM9LHOf
TLSH
65C4231EB924C236C052ABBDEDE18D0123D2E357B543CF026726776F2E97B374640A99

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Smxmzhuoi.Properties.Resources.resources
Qtwaojnngm
Informations
Name
Value
Module Name

Smxmzhuoi.exe

Full Name

Smxmzhuoi.exe

EntryPoint

System.Void Smxmzhuoi.Rugysxm::Main()

Scope Name

Smxmzhuoi.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Smxmzhuoi

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

12

Main Method

System.Void Smxmzhuoi.Rugysxm::Main()

Main IL Instruction Count

18

Main IL

newobj System.Void Smxmzhuoi.Xrjvhozn::.ctor() stloc.s V_0 br IL_000D: nop ret <null> nop <null> ldloc.s V_0 call System.Byte[] Smxmzhuoi.Properties.Ytoask::get_Qtwaojnngm() ldsfld System.Byte[] Smxmzhuoi.Providers.ConnectedProvider::literalProviderArray ldsfld System.Byte[] Smxmzhuoi.Providers.ConnectedProvider::providerStreams ldstr HslhDnS8PsUqRjadCV.aFmvJPOAPFhiiRE4RC ldstr jKjEChoMj callvirt System.Void Smxmzhuoi.Xrjvhozn::Boarizelof(System.Byte[],System.Byte[],System.Byte[],System.String,System.String) br IL_0033: leave IL_000C leave IL_000C: ret pop <null> br IL_003E: leave IL_000C leave IL_000C: ret br IL_000C: ret

Module Name

Smxmzhuoi.exe

Full Name

Smxmzhuoi.exe

EntryPoint

System.Void Smxmzhuoi.Rugysxm::Main()

Scope Name

Smxmzhuoi.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Smxmzhuoi

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

12

Main Method

System.Void Smxmzhuoi.Rugysxm::Main()

Main IL Instruction Count

18

Main IL

newobj System.Void Smxmzhuoi.Xrjvhozn::.ctor() stloc.s V_0 br IL_000D: nop ret <null> nop <null> ldloc.s V_0 call System.Byte[] Smxmzhuoi.Properties.Ytoask::get_Qtwaojnngm() ldsfld System.Byte[] Smxmzhuoi.Providers.ConnectedProvider::literalProviderArray ldsfld System.Byte[] Smxmzhuoi.Providers.ConnectedProvider::providerStreams ldstr HslhDnS8PsUqRjadCV.aFmvJPOAPFhiiRE4RC ldstr jKjEChoMj callvirt System.Void Smxmzhuoi.Xrjvhozn::Boarizelof(System.Byte[],System.Byte[],System.Byte[],System.String,System.String) br IL_0033: leave IL_000C leave IL_000C: ret pop <null> br IL_003E: leave IL_000C leave IL_000C: ret br IL_000C: ret

3cf69ea6735a45953859d139b019fcb6 (586.24 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Smxmzhuoi.Properties.Resources.resources
Qtwaojnngm
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙