Malicious
Malicious

49e9af3d4585bd4260a10610109d9413

PE Executable
|
MD5: 49e9af3d4585bd4260a10610109d9413
|
Size: 48.64 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
49e9af3d4585bd4260a10610109d9413
Sha1
f8fcbbc72fe2802ea01742184e085b2aaf2ca9cb
Sha256
443250c909c83c83d1d83ca3cbd2a78d733975846bc1a37070ff35270b15fbbd
Sha384
497bb87da2514257e7fe7fc5ed318207439d2eb9a5ca9f07f6e751e76e32477433fb0d87763f86cd93970142d3bce031
Sha512
aaa491cf78416a1ed0561a68f4476db96d891e1d1e1b179e4b66c76ed6f08a3335bd473bdbda8ebac7bd64fb17a4b5fa58830e0e5523da5a97667f21edab9c99
SSDeep
768:MvUQgNIL4+M0+Liw+hhQDXKNZi2JYb+gegUr1htWvEgK/JDZVc6KN:Mv1gjs/hhyXiKbB0r1CnkJDZVclN
TLSH
90235C403798C136E2BD4BB5ADF3A2458275D26B6903C649BCC810EA2B53FC597136FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

RFN1aE9CdGNqSzBocERoajMwdGFnQm52VE12QnJMdEo=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVAKK34sw7dAMSx2tpGm2r0pBIHW/HMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDUwNjIzMTU0NloXDTM2MDIxMzIzMTU0NlowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJTOvA+sFo9fb+Pf6K8Q5anzZ+IuUuLtC7KWp29tQi+KvRlyn9aDyvvfNWb97X75jVN/53jPtZLOVYaBAHGeg2YhljBtQLI+3wKbICCxkh17nFgwR0DdTyr19HWa7G66om8V96TcgcEuquxfId62x9dq6AeWkLJg2dcLQzNOuue5AgMBAAGjMjAwMB0GA1UdDgQWBBQ/BIkyNLMuQ2uyHLGA5GVAyw5e1TAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAAhjOCiqC/2Za4BSX35z+qidlnqHfIzMfqNVpButeYByzT62QTC0Bc96iMdBK24B1iY0d5k4sJLj5lKUnx7FWdYvW4zp+zTL243I69lEemuOAOg+X3A2Be3wiU7KU+EPPXPDFMAuB/CC9vq5vZYB0YXXcX0oekzBiPSrh1EvUS51

ServerSignature

RGZGhpjf762Ichgl3L8CxV7zHBfDHrhyg9J6aZse+UmNPTkJwSfRIkN8Bp4DZkIjHab/Dp1cfC8tz8aGUUhh8Lfzy35UhKBOaggCGJrEJctbnxSLyjRpnwZugKQh7dcmG+OWCv8umcdpeh/hbe0wO13a5c02d5n9ymCBSpvHgVk=

Install

true

BDOS

false

Anti-VM

false

Install File

chromeeee.exe

Install-Folder

%Temp%

Hosts

45.154.98.174

Ports

8080

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Client-dwwaddwa.exe

Full Name

Client-dwwaddwa.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Client-dwwaddwa.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client-dwwaddwa

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

150

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

59

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: call System.Boolean Client.Helper.MutexControl::CreateMutex() call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0057: ldsfld System.String Client.Settings::Anti_Process ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BS_OD call System.Void Client.Helper.AntiProcess::StartBlock() ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Void Client.Helper.ProcessCritical::Set() ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_009D: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Install.NormalStartup::Install() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: call System.Void Client.Connection.Amsi::Bypass() call System.Void Client.Helper.Methods::ClearSetting() call System.Void Client.Connection.Amsi::Bypass() leave IL_00C1: nop pop <null> leave IL_00C1: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00D6: leave IL_00E1 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00E1: ldc.i4 5000 pop <null> leave IL_00E1: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00C1: nop

Module Name

Client-dwwaddwa.exe

Full Name

Client-dwwaddwa.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Client-dwwaddwa.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client-dwwaddwa

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

150

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

59

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: call System.Boolean Client.Helper.MutexControl::CreateMutex() call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0057: ldsfld System.String Client.Settings::Anti_Process ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BS_OD call System.Void Client.Helper.AntiProcess::StartBlock() ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: ldsfld System.String Client.Settings::In_stall call System.Void Client.Helper.ProcessCritical::Set() ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_009D: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Install.NormalStartup::Install() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: call System.Void Client.Connection.Amsi::Bypass() call System.Void Client.Helper.Methods::ClearSetting() call System.Void Client.Connection.Amsi::Bypass() leave IL_00C1: nop pop <null> leave IL_00C1: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00D6: leave IL_00E1 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00E1: ldc.i4 5000 pop <null> leave IL_00E1: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00C1: nop

Artefacts
Name
Value
Key (AES_256)

RFN1aE9CdGNqSzBocERoajMwdGFnQm52VE12QnJMdEo=

CnC

45.154.98.174

Ports

8080

Mutex

DcRatMutex_qwqdanchun

49e9af3d4585bd4260a10610109d9413 (48.64 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

RFN1aE9CdGNqSzBocERoajMwdGFnQm52VE12QnJMdEo=

Pastebin

-

Certificate

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

ServerSignature

RGZGhpjf762Ichgl3L8CxV7zHBfDHrhyg9J6aZse+UmNPTkJwSfRIkN8Bp4DZkIjHab/Dp1cfC8tz8aGUUhh8Lfzy35UhKBOaggCGJrEJctbnxSLyjRpnwZugKQh7dcmG+OWCv8umcdpeh/hbe0wO13a5c02d5n9ymCBSpvHgVk=

Install

true

BDOS

false

Anti-VM

false

Install File

chromeeee.exe

Install-Folder

%Temp%

Hosts

45.154.98.174

Ports

8080

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

RFN1aE9CdGNqSzBocERoajMwdGFnQm52VE12QnJMdEo=

Malicious

49e9af3d4585bd4260a10610109d9413

CnC

45.154.98.174

Malicious

49e9af3d4585bd4260a10610109d9413

Ports

8080

Malicious

49e9af3d4585bd4260a10610109d9413

Mutex

DcRatMutex_qwqdanchun

Malicious

49e9af3d4585bd4260a10610109d9413

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙