Malicious
Malicious

4e0d03472ab1d8896731cf552e75f239

PE Executable
|
MD5: 4e0d03472ab1d8896731cf552e75f239
|
Size: 66.05 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
4e0d03472ab1d8896731cf552e75f239
Sha1
6de7b8fef6e32544bf344e61daf6a3816fe5eabf
Sha256
e54f398b81ea6cd06564536964e061bc0384607daa4a0ea577c502746fb4f745
Sha384
3a717d1caf785084de702b60c5b27d7d9487c2e776b665da232972c16ae0ec49ec1c4456037b23219b6f8e19964e7679
Sha512
4fee8726b191f263842540315337e65311af99cf33fc14e1eeec5946d1a01e95e95f68e817e81ee57c72397505b72a05dd5b02d0133a9d0c0b86ae1f155dba76
SSDeep
768:+XDoRAOe3EEiPw7lig9JkfcXveeObMbNCl1+6SCv7mqb2nIpwH1oeQi6ITol8GpY:+XDoME3qQeeiMl8GbbXwnQo5GVbVclN
TLSH
7B535B002B98C961E2AD4AF8ACF2550146B5D6772102DB5E7CC804DB6B9FFC64A137FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

YVJiVkZSNnpSTldIRzRjWmhmaEJxbmNOajhZMUJkRkI=

Pastebin

-

Certificate

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

ServerSignature

wepay.in.net,slotmachinesno.sa.com,digitalhari.in.net,www.wepay.in.net,www.slotmachinesno.sa.com,www.digitalhari

Install

true

BDOS

false

Anti-VM

false

Install File

down_app.exe

Install-Folder

%AppData%

Ports

80,443,2053,2083,8080,8848,8888

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

YVJiVkZSNnpSTldIRzRjWmhmaEJxbmNOajhZMUJkRkI=

Ports

80

Ports

443

Ports

2053

Ports

2083

Ports

8080

Ports

8848

Ports

8888

Mutex

DcRatMutex_qwqda

4e0d03472ab1d8896731cf552e75f239 (66.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

YVJiVkZSNnpSTldIRzRjWmhmaEJxbmNOajhZMUJkRkI=

Pastebin

-

Certificate

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

ServerSignature

wepay.in.net,slotmachinesno.sa.com,digitalhari.in.net,www.wepay.in.net,www.slotmachinesno.sa.com,www.digitalhari

Install

true

BDOS

false

Anti-VM

false

Install File

down_app.exe

Install-Folder

%AppData%

Ports

80,443,2053,2083,8080,8848,8888

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

YVJiVkZSNnpSTldIRzRjWmhmaEJxbmNOajhZMUJkRkI=

Malicious

4e0d03472ab1d8896731cf552e75f239

Ports

80

Malicious

4e0d03472ab1d8896731cf552e75f239

Ports

443

Malicious

4e0d03472ab1d8896731cf552e75f239

Ports

2053

Malicious

4e0d03472ab1d8896731cf552e75f239

Ports

2083

Malicious

4e0d03472ab1d8896731cf552e75f239

Ports

8080

Malicious

4e0d03472ab1d8896731cf552e75f239

Ports

8848

Malicious

4e0d03472ab1d8896731cf552e75f239

Ports

8888

Malicious

4e0d03472ab1d8896731cf552e75f239

Mutex

DcRatMutex_qwqda

Malicious

4e0d03472ab1d8896731cf552e75f239

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙