Malicious
Malicious

483b8d9ad9d6c689d1bffd6ff80bc09c

PE Executable
|
MD5: 483b8d9ad9d6c689d1bffd6ff80bc09c
|
Size: 1.36 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
483b8d9ad9d6c689d1bffd6ff80bc09c
Sha1
e83198de12aa61940d21fa6f0d2d691aa8ce4b88
Sha256
5a0853c9a02dd74b5ef3292b42b585edff8c41e1464304c9dc68ca1b106514b9
Sha384
9a501402f9e6f2f03322699fecb8a2a5ba2bc2065c411119aeba43e99c3ce85e0f1173d0c7e9b181babb97f6809a6d11
Sha512
6bff50a8e76df5561b8b4bc3f602dcd55354b9536665c148937d70411a36a3268c54fe573454b2b3644513591b3ddc624986ddc06d2162778e1ee4ddcb94b4fa
SSDeep
24576:+zOHXG6DO0H1iq7cUa/fU+awWr4DshhxpQR8g49r/:+z4192fUdwiSshLpQRYh
TLSH
EE556C017E84CE12F0192233C2FF454887B8AD5166A6E72B7DBA376E55123A73D0D9CB

PeID

.NET executable
HQR data file
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
.Net Resources
SvrwE86b6flBo2Vo6q.N0wL8kysUjQNw71Y3f
DkCnssWLF397PEiOSI.l13VV7CdonBU2LgMNI
Informations
Name
Value
Module Name

rkcvqg2v9dSk9N9FOWpPQYW2NC9I8klhaMaT66RZm

Full Name

rkcvqg2v9dSk9N9FOWpPQYW2NC9I8klhaMaT66RZm

EntryPoint

System.Void gd6CoENen8EfRbWE7NJ.kkPkbgNrw5K2SxvYJla::uqqvFKn6bH()

Scope Name

rkcvqg2v9dSk9N9FOWpPQYW2NC9I8klhaMaT66RZm

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

mlkqkGxDIP3ynTOjinguxY1uKxxpJSFQnZwuSgc

Assembly Version

8.3.9.4

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void gd6CoENen8EfRbWE7NJ.kkPkbgNrw5K2SxvYJla::uqqvFKn6bH()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void KwP31ZvIXQXHqsEQwFM.AKIlDevOgbpxctGbNDr::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object gd6CoENen8EfRbWE7NJ.kkPkbgNrw5K2SxvYJla::VuPvjZ4dCT callvirt System.Void UW2DuWNOOAoHP6opxw9.i03VofNTmYk6FpHYIm0::JhcnCLKVNy() nop <null> ret <null>

Module Name

rkcvqg2v9dSk9N9FOWpPQYW2NC9I8klhaMaT66RZm

Full Name

rkcvqg2v9dSk9N9FOWpPQYW2NC9I8klhaMaT66RZm

EntryPoint

System.Void gd6CoENen8EfRbWE7NJ.kkPkbgNrw5K2SxvYJla::uqqvFKn6bH()

Scope Name

rkcvqg2v9dSk9N9FOWpPQYW2NC9I8klhaMaT66RZm

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

mlkqkGxDIP3ynTOjinguxY1uKxxpJSFQnZwuSgc

Assembly Version

8.3.9.4

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void gd6CoENen8EfRbWE7NJ.kkPkbgNrw5K2SxvYJla::uqqvFKn6bH()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void KwP31ZvIXQXHqsEQwFM.AKIlDevOgbpxctGbNDr::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object gd6CoENen8EfRbWE7NJ.kkPkbgNrw5K2SxvYJla::VuPvjZ4dCT callvirt System.Void UW2DuWNOOAoHP6opxw9.i03VofNTmYk6FpHYIm0::JhcnCLKVNy() nop <null> ret <null>

Artefacts
Name
Value
Embedded Resources

2

Suspicious Type Names (1-2 chars)

0

483b8d9ad9d6c689d1bffd6ff80bc09c (1.36 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
.Net Resources
SvrwE86b6flBo2Vo6q.N0wL8kysUjQNw71Y3f
DkCnssWLF397PEiOSI.l13VV7CdonBU2LgMNI
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

2

483b8d9ad9d6c689d1bffd6ff80bc09c

Suspicious Type Names (1-2 chars)

0

483b8d9ad9d6c689d1bffd6ff80bc09c

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙