Malicious
Malicious

44797d8f0e136446a88a0d4a93100c15

PE Executable
|
MD5: 44797d8f0e136446a88a0d4a93100c15
|
Size: 1.59 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
44797d8f0e136446a88a0d4a93100c15
Sha1
88b77453228e457a0e7fa86fca8d24f767b8c8b0
Sha256
452896fac3f4fea522f38b7974de9428b372bef3ccd30953ba7e808643312d11
Sha384
812b2c8ca27f20c888ea14cd5e7a6e513f1e8d5ce232875a6d26cce936d9b8617318d1e56b4c27a356de723e06b0bbf9
Sha512
d3a0690cafb35138b5b4b5142ccb1b0aa98c1b277eaf510a6418ab59cba5c6b8c8b6c706211176ae9a0321fb9cf5e583dfc6e1550461ed43d07b33f64b230849
SSDeep
24576:gTQT+hDw6VB8Q3yIi3KIX58G1qaPAVy1nDPE9bEmxgJRRhh53t:gTQgwfQCLZX5d1sV2DMEmaFj53
TLSH
CB758C027E448E21F1195633C2EF455887B8985166E6E32B7DBB336E19523E73C0DACB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

44797d8f0e136446a88a0d4a93100c15 (1.59 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙