Suspicious
Suspect

5ab23ac79ede02166d6f5013d89738f9

PE Executable
|
MD5: 5ab23ac79ede02166d6f5013d89738f9
|
Size: 47.11 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
5ab23ac79ede02166d6f5013d89738f9
Sha1
850456e345e702056c3fd2b7ff3e9ff7a78928be
Sha256
c496313ad238522297b09b3430a362dbf21db8825e0e306bbd5840c12129a376
Sha384
45a1691517045ea46917bcb17b38316f40edd669e176efd5bb7c0bf73f92bb760dd289e7401f189e24f2343e3764b98c
Sha512
d3cb36fd85e065e7b5c66e8da7a422abe13484998eef5950ea26174778de1f9999f9fedcc9c6a4a93f3cb9cc31e3085a6ec3306b76d95a03fa4299f20f68ef09
SSDeep
768:3dhO/poiiUcjlJInV9SH9Xqk5nWEZ5SbTDaHuI7CPW5eC:tw+jjgnVoH9XqcnW85SbTSuIGC
TLSH
6323E84C57AD8923F6AF1ABD98314263C7B3E226A532E38F48CCD4E9379338544453A7

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

5ab23ac79ede02166d6f5013d89738f9 (47.11 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙