Malicious
Malicious

59978cbea27bdb89b2798c3b1bfaea75

PE Executable
|
MD5: 59978cbea27bdb89b2798c3b1bfaea75
|
Size: 1.59 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
59978cbea27bdb89b2798c3b1bfaea75
Sha1
89a1ddfffcce89d3b5675b8d2106e2d09ea7f523
Sha256
4c940f9d7bd8b2397c93151446cf167acbde7afe5fb29205f3f58bf79d714ea0
Sha384
b8e94553203b07e504b732cb4a6a91cf9d3cf9630b72421be184c0d5476c4abf9bf2e438c264e6b1c31ff04f776e9521
Sha512
1307f48cefd31d43cd5a9b9f9331973efc551c5ebeec7de54a0b4f5a88ae1415d24ff351129cdde39ee828320b27fcbc7031a5b2f4caa6e9825640730b2a632c
SSDeep
24576:ATQT+hDw6VB8Q3yIi3KIX58G1qaPAVy1nDPE9bEmxgJRRhh53t:ATQgwfQCLZX5d1sV2DMEmaFj53
TLSH
9A758C027E448E21F1195633C2EF455887B8985166E6E32B7DBB336E19523E73C0DACB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

59978cbea27bdb89b2798c3b1bfaea75 (1.59 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙