Suspicious
Suspect

4c5639ca18826695f459ccfc92c44f0e

PE Executable
|
MD5: 4c5639ca18826695f459ccfc92c44f0e
|
Size: 25.16 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
4c5639ca18826695f459ccfc92c44f0e
Sha1
2f7ff48cb432122cdde2961e9cd0feb18d767227
Sha256
695114d5f50f7ec14eee514b7390c18de275b820f22af27139832b594f798f0c
Sha384
93628ca4d0d4b6784b45c3ca921fab6cc17fc34dc9a40929cd8f631df55ad5e1ae30671d593f0348b8bf86455151b6b4
Sha512
16e14252e06e38224a305c386c700d04f79808227328605fcc6e10a79b8269e182141ed31b9d08c490164bfa112fe3e0f1835b75a6f42a8a91cc6c329c9c78ef
SSDeep
393216:uAmMJ8cQxLpkl58huW4EMo5b5qidkwqc6dDoRRFRobdzUFX4fCssymlwcaIXKz0T:5TycQxLpkMhuhtTidkDjDorXdQinJZ/a
TLSH
CA4733F4F7357A68E9982DFA84275353916014625AC78E27E3F2079293333EFB9026D1

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
UPolyX 0.3 -> delikon
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ukwdneajfjbc.Resources
Killer Clown 2.0.exe
WannaCrypt0r.exe
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Merzoct.exe

Full Name

Merzoct.exe

EntryPoint

System.Void Program::Main()

Scope Name

Merzoct.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Merzoct

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

10

Main Method

System.Void Program::Main()

Main IL Instruction Count

10

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: ldnull call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

Module Name

Merzoct.exe

Full Name

Merzoct.exe

EntryPoint

System.Void Program::Main()

Scope Name

Merzoct.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Merzoct

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

10

Main Method

System.Void Program::Main()

Main IL Instruction Count

10

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: ldnull call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

4c5639ca18826695f459ccfc92c44f0e (25.16 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ukwdneajfjbc.Resources
Killer Clown 2.0.exe
WannaCrypt0r.exe
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙