Suspicious
Suspect

53caeb10cf0f802ec7597cff67bc9a13

PE Executable
|
MD5: 53caeb10cf0f802ec7597cff67bc9a13
|
Size: 843.27 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
53caeb10cf0f802ec7597cff67bc9a13
Sha1
15350c3cde5c318bb9a4972aca9bc46cbbde0fac
Sha256
cba5a4c3813bbce1dfd6591d94bdd59e773c33d06d4a534da0b3cb527f0a9f7b
Sha384
739a70e02552ea1e114ea31ce6f32489b6b9204f341c4e025048cdff30df0381c51bd577658dbbe5998af402041bc591
Sha512
2362affde92d39b94b15459be776047c885405cf5fb4264ce8c8546d68b4a7c234d4af111bebe0ef60f7afa69944d1f550f4e3ab0b7aefb4eca7b6d737103d15
SSDeep
12288:n7IgdXoEZLZsK480IeBdw01+DlM2I+vifF+8BmJLMUdwVM3oWrFf9MFxzjchan2i:xnZmK79Ad8JMzrkJLMRO3drFlMjjD
TLSH
D805CF9C3250B99FC853DA7289A4DD74AA206DAB5707D20390E71DEFBD0CA97CF141E2

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
UnitConverter.Forms.MainForm.resources
UnitConverter.Properties.Resources.resources
QKzC
[NBF]root.Data
[NBF]root.Data-preview.png
shu
[NBF]root.Data
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xCA800 size 13832 bytes

Module Name

TQeW.exe

Full Name

TQeW.exe

EntryPoint

System.Void UnitConverter.Program::Main()

Scope Name

TQeW.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

TQeW

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void UnitConverter.Program::Main()

Main IL Instruction Count

37

Main IL

nop <null> call System.Void UnitConverter.Program::‌‫‫‭‏‮‎‍‌‍‍‎‬‎‭‌‪‬​​‬​‍‍‮() ldc.i4 -867226263 ldc.i4 -866140043 xor <null> dup <null> stloc.0 <null> ldc.i4.5 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_006F: nop nop <null> newobj System.Void UnitConverter.Forms.MainForm::.ctor() call System.Void UnitConverter.Program::‮‫‪‫‪‏‫‪‮‮‮‍‬‭‌‌‪‮‏‫‬‏‏‍‎​‎‍‮(System.Windows.Forms.Form) ldloc.0 <null> ldc.i4 980742755 mul <null> ldc.i4 1249159554 xor <null> br.s IL_000B: ldc.i4 -866140043 ldc.i4.0 <null> call System.Void UnitConverter.Program::‪‭​‌‌‭‌‭‫‏​‏‍‮‍‭‪‏‎‮(System.Boolean) ldloc.0 <null> ldc.i4 503122534 mul <null> ldc.i4 -1577694896 xor <null> br.s IL_000B: ldc.i4 -866140043 nop <null> ldloc.0 <null> ldc.i4 743682493 mul <null> ldc.i4 -1919220163 xor <null> br.s IL_000B: ldc.i4 -866140043 nop <null> ret <null>

Module Name

TQeW.exe

Full Name

TQeW.exe

EntryPoint

System.Void UnitConverter.Program::Main()

Scope Name

TQeW.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

TQeW

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void UnitConverter.Program::Main()

Main IL Instruction Count

37

Main IL

nop <null> call System.Void UnitConverter.Program::‌‫‫‭‏‮‎‍‌‍‍‎‬‎‭‌‪‬​​‬​‍‍‮() ldc.i4 -867226263 ldc.i4 -866140043 xor <null> dup <null> stloc.0 <null> ldc.i4.5 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_006F: nop nop <null> newobj System.Void UnitConverter.Forms.MainForm::.ctor() call System.Void UnitConverter.Program::‮‫‪‫‪‏‫‪‮‮‮‍‬‭‌‌‪‮‏‫‬‏‏‍‎​‎‍‮(System.Windows.Forms.Form) ldloc.0 <null> ldc.i4 980742755 mul <null> ldc.i4 1249159554 xor <null> br.s IL_000B: ldc.i4 -866140043 ldc.i4.0 <null> call System.Void UnitConverter.Program::‪‭​‌‌‭‌‭‫‏​‏‍‮‍‭‪‏‎‮(System.Boolean) ldloc.0 <null> ldc.i4 503122534 mul <null> ldc.i4 -1577694896 xor <null> br.s IL_000B: ldc.i4 -866140043 nop <null> ldloc.0 <null> ldc.i4 743682493 mul <null> ldc.i4 -1919220163 xor <null> br.s IL_000B: ldc.i4 -866140043 nop <null> ret <null>

53caeb10cf0f802ec7597cff67bc9a13 (843.27 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
UnitConverter.Forms.MainForm.resources
UnitConverter.Properties.Resources.resources
QKzC
[NBF]root.Data
[NBF]root.Data-preview.png
shu
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙