Malicious
Malicious

4a51821151e59c74035f5cea24903760

PE Executable
|
MD5: 4a51821151e59c74035f5cea24903760
|
Size: 65.54 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
4a51821151e59c74035f5cea24903760
Sha1
5f5098208efdff289d98853d30c4367da40bad4a
Sha256
8943c75d3f974d35e552c914bc64df0bbce1eabab18b0ffda945665e7ba37691
Sha384
0fcd1532aab4186191effcc367f894e6f7434406fa2c4826adeb24552663e873a58bbeca05d81ed2ef33c75a1b49c7f6
Sha512
e4fdc4f3890189e59be988b6c8736cc8f7633a68cb916464ab8b54d7e1914e038293cfdb8a95aa1bb18ad776f1880ad388192804811e7dd85db2cabe6beaa004
SSDeep
768:93lDmSRCvHxiP7VIiz9JSRHQnghQ6xyQawa1++SCv7mqb2nwpwH1oZQISB8GXlNn:9cHWRQQnga4awaoGbbJw0lG1+VclN
TLSH
46535A002798C925F2AD4AB4ADF2950146B5D5332106DA5E7CC804DB6BAEFCA49137FF
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

OFozQURGaXNkNDBDT25Ecm5KYjl5TUV5VTF2TlUwd0k=

Pastebin

-

Certificate

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

ServerSignature

bGDePxQDWwvE8mj5J/GjjmCcsQjpdSJwTPaVgGVvap2KEjbxLO1JFnF630Adhx2Dr7lf5gXTRkVn/PbuM3O0mTrup0zrVcAfemR3PS0EHzfQ/8WacmU8cBFJ4XSZEXibwmIylSIOnkind6TRROtXdw0Xiq3K2UmS7puDDA0ARfI=

Install

true

BDOS

false

Anti-VM

true

Install File

aws_support.exe

Install-Folder

%AppData%

Hosts

xvideox.za.com,support.xvideox.za.com

Ports

1604,4782,8080,8848,8888,9527

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

aws_support.exe

Full Name

aws_support.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

aws_support.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

aws_support

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

OFozQURGaXNkNDBDT25Ecm5KYjl5TUV5VTF2TlUwd0k=

CnC

xvideox.za.com

CnC

support.xvideox.za.com

Ports

1604

Ports

4782

Ports

8080

Ports

8848

Ports

8888

Ports

9527

Mutex

DcRatMutex_qwqdanchun

4a51821151e59c74035f5cea24903760 (65.54 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

OFozQURGaXNkNDBDT25Ecm5KYjl5TUV5VTF2TlUwd0k=

Pastebin

-

Certificate

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

ServerSignature

bGDePxQDWwvE8mj5J/GjjmCcsQjpdSJwTPaVgGVvap2KEjbxLO1JFnF630Adhx2Dr7lf5gXTRkVn/PbuM3O0mTrup0zrVcAfemR3PS0EHzfQ/8WacmU8cBFJ4XSZEXibwmIylSIOnkind6TRROtXdw0Xiq3K2UmS7puDDA0ARfI=

Install

true

BDOS

false

Anti-VM

true

Install File

aws_support.exe

Install-Folder

%AppData%

Hosts

xvideox.za.com,support.xvideox.za.com

Ports

1604,4782,8080,8848,8888,9527

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

OFozQURGaXNkNDBDT25Ecm5KYjl5TUV5VTF2TlUwd0k=

Malicious

4a51821151e59c74035f5cea24903760

CnC

xvideox.za.com

Malicious

4a51821151e59c74035f5cea24903760

CnC

support.xvideox.za.com

Malicious

4a51821151e59c74035f5cea24903760

Ports

1604

Malicious

4a51821151e59c74035f5cea24903760

Ports

4782

Malicious

4a51821151e59c74035f5cea24903760

Ports

8080

Malicious

4a51821151e59c74035f5cea24903760

Ports

8848

Malicious

4a51821151e59c74035f5cea24903760

Ports

8888

Malicious

4a51821151e59c74035f5cea24903760

Ports

9527

Malicious

4a51821151e59c74035f5cea24903760

Mutex

DcRatMutex_qwqdanchun

Malicious

4a51821151e59c74035f5cea24903760

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙