Suspicious
Suspect

55f3f55420a2ac77b38da0507aea116b

PE Executable
|
MD5: 55f3f55420a2ac77b38da0507aea116b
|
Size: 240.13 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Very low

Hash
Hash Value
MD5
55f3f55420a2ac77b38da0507aea116b
Sha1
ffe99543bd00a40834d0706653e1eedc6d627fb2
Sha256
d443f93731f57db11bc5df7a4dfcdcce185f65b22b917a0794e2369a20a8c72e
Sha384
f5b09e70a5d7af8138b7e4a21914959e60c9c0809d442c965e8e873cc9571d5422ee0ccc82ec53b69fc64dbe26311024
Sha512
c68bf1504505d21a1505498a2e39da86dc2004608f2b83b24f8897d6319e9967de93ae57e4e6f68465f1d58fc7dd561ecca6e3f8cbd5657576d2d73d4483200d
SSDeep
3072:S1b8muKKZmrZj7Iq+gJTef4Vxv9EOYfcjQyGv/TCt1wEC6fFTB5:uba2nh+g1Z9Pj8/TCm
TLSH
92347DE6A348DC19EF72193C34DF9718322BEEA3FD52760713D47389A9723D9215281A
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:1033-preview.png
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
ID:0011
ID:1033
ID:0012
ID:1033
ID:0013
ID:1033
ID:1033-preview.png
ID:0014
ID:1033
ID:0015
ID:1033
ID:0016
ID:1033
ID:0017
ID:1033
ID:0018
ID:1033
ID:0019
ID:1033
ID:001A
ID:1033
ID:001B
ID:1033
ID:001C
ID:1033
ID:001D
ID:1033
ID:001E
ID:1033
ID:001F
ID:1033
ID:0020
ID:1033
ID:1033-preview.png
ID:0021
ID:1033
ID:0022
ID:1033
ID:0023
ID:1033
ID:0024
ID:1033
ID:0025
ID:1033
ID:0026
ID:1033
ID:0027
ID:1033
RT_GROUP_CURSOR4
ID:0065
ID:1033
ID:0066
ID:1033
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

GeneratedExe.exe

Full Name

GeneratedExe.exe

EntryPoint

System.Void Program::Main()

Scope Name

GeneratedExe.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

GeneratedExe

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

5

Main Method

System.Void Program::Main()

Main IL Instruction Count

104

Main IL

nop <null> ldc.i4 13087 newarr System.Byte dup <null> ldtoken <PrivateImplementationDetails>/__StaticArrayInitTypeSize=13087 <PrivateImplementationDetails>::03BD0C5C529D7818027C849177DCCED9F77C789799B04EC047C363363914FB3A call System.Void System.Runtime.CompilerServices.RuntimeHelpers::InitializeArray(System.Array,System.RuntimeFieldHandle) stloc.0 <null> call System.Collections.Generic.Dictionary`2<System.String,System.Int32> Program::InitializeData() stloc.1 <null> ldloc.1 <null> call System.Int32 Program::ProcessData(System.Collections.Generic.Dictionary`2<System.String,System.Int32>) stloc.2 <null> ldloc.2 <null> call System.Void Program::Cleanup(System.Int32) nop <null> call System.String System.IO.Path::GetTempPath() call System.Guid System.Guid::NewGuid() stloc.s V_4 ldloca.s V_4 constrained. System.Guid callvirt System.String System.Object::ToString() ldstr .bat call System.String System.String::Concat(System.String,System.String) call System.String System.IO.Path::Combine(System.String,System.String) stloc.3 <null> nop <null> ldloc.3 <null> ldloc.0 <null> call System.Void System.IO.File::WriteAllBytes(System.String,System.Byte[]) nop <null> newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() stloc.s V_6 ldloc.s V_6 ldstr cmd.exe callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) nop <null> ldloc.s V_6 ldstr /C " ldloc.3 <null> ldstr " call System.String System.String::Concat(System.String,System.String,System.String) callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Arguments(System.String) nop <null> ldloc.s V_6 ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_WindowStyle(System.Diagnostics.ProcessWindowStyle) nop <null> ldloc.s V_6 ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_CreateNoWindow(System.Boolean) nop <null> ldloc.s V_6 ldc.i4.0 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) nop <null> ldloc.s V_6 ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_RedirectStandardOutput(System.Boolean) nop <null> ldloc.s V_6 ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_RedirectStandardError(System.Boolean) nop <null> ldloc.s V_6 stloc.s V_5 ldloc.s V_5 call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) stloc.s V_7 nop <null> ldloc.s V_7 callvirt System.IO.StreamReader System.Diagnostics.Process::get_StandardOutput() callvirt System.String System.IO.TextReader::ReadToEnd() stloc.s V_8 ldloc.s V_7 callvirt System.IO.StreamReader System.Diagnostics.Process::get_StandardError() callvirt System.String System.IO.TextReader::ReadToEnd() stloc.s V_9 ldloc.s V_7 callvirt System.Void System.Diagnostics.Process::WaitForExit() nop <null> nop <null> leave.s IL_00F8: nop ldloc.s V_7 brfalse.s IL_00F7: endfinally ldloc.s V_7 callvirt System.Void System.IDisposable::Dispose() nop <null> endfinally <null> nop <null> leave.s IL_010E: ret nop <null> nop <null> ldloc.3 <null> call System.Void System.IO.File::Delete(System.String) nop <null> nop <null> leave.s IL_010C: nop pop <null> nop <null> nop <null> leave.s IL_010C: nop nop <null> endfinally <null> ret <null>

55f3f55420a2ac77b38da0507aea116b (240.13 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:1033-preview.png
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:000F
ID:1033
ID:0010
ID:1033
ID:0011
ID:1033
ID:0012
ID:1033
ID:0013
ID:1033
ID:1033-preview.png
ID:0014
ID:1033
ID:0015
ID:1033
ID:0016
ID:1033
ID:0017
ID:1033
ID:0018
ID:1033
ID:0019
ID:1033
ID:001A
ID:1033
ID:001B
ID:1033
ID:001C
ID:1033
ID:001D
ID:1033
ID:001E
ID:1033
ID:001F
ID:1033
ID:0020
ID:1033
ID:1033-preview.png
ID:0021
ID:1033
ID:0022
ID:1033
ID:0023
ID:1033
ID:0024
ID:1033
ID:0025
ID:1033
ID:0026
ID:1033
ID:0027
ID:1033
RT_GROUP_CURSOR4
ID:0065
ID:1033
ID:0066
ID:1033
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙