Suspicious
Suspect

60cd5035c1ff060c1514c74d1773f69a

PE Executable
|
MD5: 60cd5035c1ff060c1514c74d1773f69a
|
Size: 46.59 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
60cd5035c1ff060c1514c74d1773f69a
Sha1
2ee276a2a1c4ddaed9a85e6dd6904d19d786469f
Sha256
f6fa8555a235ddfafb5f84807c3a7a70ea01eae62c012807f59a28a0ec17cd6a
Sha384
45a27c5d74b50d5b43107075be2dc80fd442b649f0ea1552a29b05645828f729d72428d41557b51f55437c1dfa5f9608
Sha512
032d9f47a4bfba3d9d74d01b80c1f6ffa17993d61b6c6dc9d7e915781848f0d686dab4e7e641049ab2d2f72baa5a0e55f559e6aa58dfe38547814e41c1ceb552
SSDeep
768:FdhO/poiiUcjlJInNVH9Xqk5nWEZ5SbTDaSruI7CPW5N:bw+jjgn7H9XqcnW85SbTbruIF
TLSH
CB23E74C57AC8927E6AF1ABD98324263C7B3E3669532E38F08CCD4E937973855805397

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

Module Name

xeno rat client.exe

Full Name

xeno rat client.exe

EntryPoint

System.Void xeno_rat_client.Program::<Main>(System.String[])

Scope Name

xeno rat client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xeno rat client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

64

Main Method

System.Void xeno_rat_client.Program::<Main>(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task xeno_rat_client.Program::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

60cd5035c1ff060c1514c74d1773f69a (46.59 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙