Suspicious
Suspect

5f2c0a766b2f2c42ed376d236d055f54

PE Executable
|
MD5: 5f2c0a766b2f2c42ed376d236d055f54
|
Size: 207.36 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
5f2c0a766b2f2c42ed376d236d055f54
Sha1
9f8e252751030c26323a98c37c812c09a9296c28
Sha256
ff9c7d024d2c1e379be44e420c9061d29b335a367492d6d7ce957a8a52628d3d
Sha384
43d150b276866e120f0e2ced505030b683cd3099ec6ead36a54db6db620284c3c31ceaf4672118bc6993b7c8832cd0ee
Sha512
50e82e237b5e6f785fbd63a86d43508c144cd0c7de1baf3287d2fdaf00908986191ad939a4f2016af824b94b2b85f34866fb206688695bbb2ae2a9c088f37fb0
SSDeep
3072:gzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIXN0EhIW0DJsuNRBIEEgmzw:gLV6Bta6dtJmakIM5PEIGuNR5Rn
TLSH
3C14BF567BB98A2FE2DE897971121243873CC2E3A9D3F3DE18D454B68B623E406471D3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_RCDATA
ID:0001
ID:0
.Net Resources
ClientLoaderForm.resources
     ​     
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

NanoCore Client.exe

Full Name

NanoCore Client.exe

EntryPoint

System.Void ClientLoaderForm::Main()

Scope Name

NanoCore Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

NanoCore Client

Assembly Version

1.2.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Void ClientLoaderForm::Main()

Main IL Instruction Count

4

Main IL

call #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw== #=q_jQLaNdtSDa6ovA0VGw50w==::#=qqROT7DfncW7strhZvp0iRQ==() callvirt ClientLoaderForm #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw==::#=qbzig1$2CwLluEJt5uPtpgqPx5y_2S$GoPgJP36N8bTE=() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

NanoCore Client.exe

Full Name

NanoCore Client.exe

EntryPoint

System.Void ClientLoaderForm::Main()

Scope Name

NanoCore Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

NanoCore Client

Assembly Version

1.2.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Void ClientLoaderForm::Main()

Main IL Instruction Count

4

Main IL

call #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw== #=q_jQLaNdtSDa6ovA0VGw50w==::#=qqROT7DfncW7strhZvp0iRQ==() callvirt ClientLoaderForm #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw==::#=qbzig1$2CwLluEJt5uPtpgqPx5y_2S$GoPgJP36N8bTE=() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

5f2c0a766b2f2c42ed376d236d055f54 (207.36 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_RCDATA
ID:0001
ID:0
.Net Resources
ClientLoaderForm.resources
     ​     
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙