Malicious
Malicious

6ac5ea4707fbbb1af0b9b1bd62a2c2da

PE Executable
|
MD5: 6ac5ea4707fbbb1af0b9b1bd62a2c2da
|
Size: 1.59 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
6ac5ea4707fbbb1af0b9b1bd62a2c2da
Sha1
a2e2234a191313c8eafc49f4c7665f6636ad03ea
Sha256
43647972490c89b2f54bb84a4abdcf9037cc2f6d0768b9cdad9ec22deb935e11
Sha384
b806469edbff058d345092ab5ad40875eca4a34f70a8563cf8d5b3dc61f848ed30a9d689ca45b567ed5f095c12df30d0
Sha512
e17a4a1a99b56a7b3d742a249a567eaf05556372178dfcbc907e11a6a25f96fc15924a5c4f7fb53076baec869d9b26a801cbf038cfe7352553a4971269f66d50
SSDeep
24576:YTQT+hDw6VB8Q3yIi3KIX58G1qaPAVy1nDPE9bEmxgJRRhh53t:YTQgwfQCLZX5d1sV2DMEmaFj53
TLSH
08758C027E448E21F1195633C2EF455887B8985166E6E32B7DBB336E19523E73C0DACB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

6ac5ea4707fbbb1af0b9b1bd62a2c2da (1.59 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙