Suspect
4c4b20bf28e050b0b49d9ccdfce68590
PE Executable | MD5: 4c4b20bf28e050b0b49d9ccdfce68590 | Size: 80.38 KB | application/x-dosexec
PE Executable
MD5: 4c4b20bf28e050b0b49d9ccdfce68590
Size: 80.38 KB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Obfuscation Score
Low
|
Hash | Hash Value |
|---|---|
| MD5 | 4c4b20bf28e050b0b49d9ccdfce68590
|
| Sha1 | e3d95e863064a839b15d284260202e9c44da391f
|
| Sha256 | f73dcc879aa2d1b6ccae766201f9e24aae547258838bfd1200b4a51b9ffe0b23
|
| Sha384 | a841526c9512a01aadb8993cb5c2e710528912190776bc78151c54280a216a965e014a9776efed9f5feac8c39a3f043a
|
| Sha512 | ede571316f094e9d80e7257379c3b7e638c090980b9f00cae5bfdea3cc769e4e518a49becd2808c6361c5948124ddffa0f48263d71e566a37c236cb8dc044075
|
| SSDeep | 1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V++PIC:5Zv5PDwbjNrmAE+6IC
|
| TLSH | 1273B8C877AD8903FBBF5EFD147141524B72BB17E935F68D088C54E611A2B828C42B9B
|
PeID
Microsoft Visual C++ DLL
Microsoft Visual C++ v6.0
File Structure
4c4b20bf28e050b0b49d9ccdfce68590
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Module Name | Discord rat.exe |
| Full Name | Discord rat.exe |
| EntryPoint | System.Void Discord_rat.Program::Main(System.String[]) |
| Scope Name | Discord rat.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Discord rat |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.6.1 |
| Total Strings | 403 |
| Main Method | System.Void Discord_rat.Program::Main(System.String[]) |
| Main IL Instruction Count | 6 |
| Main IL | call System.Threading.Tasks.Task Discord_rat.Program::MainAsync() callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null> |
4c4b20bf28e050b0b49d9ccdfce68590 (80.38 KB)
File Structure
4c4b20bf28e050b0b49d9ccdfce68590
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.