Suspicious
Suspect

60eb9c7500e862b147abe91eae94579c

PE Executable
|
MD5: 60eb9c7500e862b147abe91eae94579c
|
Size: 264.45 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
60eb9c7500e862b147abe91eae94579c
Sha1
940c01dd0cd625b8b3fab93e57614cb36d464c7a
Sha256
cb91a07bcde29ad710bcc98259ea71f15b4a0fe65082fa6481ab8ac8b8b641e0
Sha384
bf2cc515fdf28d23e89903df7c828050e96f311db3755c088187bcd9b150edc6feecfca2f890b39dea93d366e9ed3c14
Sha512
ea9fa5d33daaaf4d888c27941e0433f4f63e2b363183ae6757e9ca8fc6d85b913322b56b03d0684cb5437a9f11d45227c30341ddebe03535236594530b8797d9
SSDeep
3072:44NpVq8BxFRzaqF+o2GQJ7/JzqVfGvq/qieg9okIrVueJ0oFFKjX5myEZpv+LuTb:4gVqwlLx9eg9okROFQjjEZpTpm0wMJ
TLSH
6F446B6A8EEBB242C5425474B93363814A7D1F75A5CF35518EF33FAD4AF3CA521230A2

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Int32 mpress._::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Int32 mpress._::Main(System.String[])

Main IL Instruction Count

75

Main IL

nop <null> call System.String System.Windows.Forms.Application::get_ExecutablePath() ldloca.s V_0 call System.Boolean mpress._::lf(System.String,System.Byte[]&) stloc.s V_6 ldloc.s V_6 brtrue.s IL_0029: nop nop <null> ldstr File is invalid. ldstr MPRESS call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldc.i4.m1 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 nop <null> ldloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stsfld System.Reflection.Assembly mpress._::mp ldsfld System.Reflection.Assembly mpress._::mp callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.1 <null> ldnull <null> stloc.3 <null> ldloc.1 <null> callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> ldc.i4.0 <null> cgt <null> ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0066: ldloc.1 ldc.i4.1 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_7 stloc.3 <null> ldloc.1 <null> ldnull <null> ldloc.3 <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_4 ldloc.s V_4 ldnull <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0085: ldc.i4.0 ldloc.s V_4 unbox.any System.Int32 stloc.2 <null> br.s IL_0087: nop ldc.i4.0 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop pop <null> nop <null> ldc.i4.m1 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop nop <null> ldloc.2 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 ldloc.s V_5 ret <null>

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Int32 mpress._::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Int32 mpress._::Main(System.String[])

Main IL Instruction Count

75

Main IL

nop <null> call System.String System.Windows.Forms.Application::get_ExecutablePath() ldloca.s V_0 call System.Boolean mpress._::lf(System.String,System.Byte[]&) stloc.s V_6 ldloc.s V_6 brtrue.s IL_0029: nop nop <null> ldstr File is invalid. ldstr MPRESS call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldc.i4.m1 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 nop <null> ldloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stsfld System.Reflection.Assembly mpress._::mp ldsfld System.Reflection.Assembly mpress._::mp callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.1 <null> ldnull <null> stloc.3 <null> ldloc.1 <null> callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> ldc.i4.0 <null> cgt <null> ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0066: ldloc.1 ldc.i4.1 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_7 stloc.3 <null> ldloc.1 <null> ldnull <null> ldloc.3 <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_4 ldloc.s V_4 ldnull <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0085: ldc.i4.0 ldloc.s V_4 unbox.any System.Int32 stloc.2 <null> br.s IL_0087: nop ldc.i4.0 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop pop <null> nop <null> ldc.i4.m1 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop nop <null> ldloc.2 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 ldloc.s V_5 ret <null>

60eb9c7500e862b147abe91eae94579c (264.45 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙