Malicious
Malicious

6b015602c760995d2e62698614209aff

PE Executable
|
MD5: 6b015602c760995d2e62698614209aff
|
Size: 356.35 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Medium

Hash
Hash Value
MD5
6b015602c760995d2e62698614209aff
Sha1
665ce0bcaf6cefa09944c0dd3563ea988b32163d
Sha256
45275cf8067fccc6bf6d6596f95603fc2691f2ea4ff5aadfd3de94fabf3fcff2
Sha384
1fad42199c8fc18c96dac3107a2d64f8fd3c466c06fa37a2bc0aea3a9e6c1edf10a5394ce984cccfb070880a47e1d52c
Sha512
fb3a4ee2c290f2d9680479c0256eda35518b7680d569977f1dd4773cee56712c6a39a0386173f8d677845f5bafd1076b9c70b74994d12e8ac66beab0923c8e8f
SSDeep
3072:ssrt+8Hiefcu00MKpyDcsvp6ByEGB4LJYp4nm89OZrX92V+dCw/JMQRkRbFHuqRH:sGNHXf500MBeLvm4XRSb8PagDqAwvVC
TLSH
1B748B5773A4E63BD1BE173BE43246154BB0D443B616F38B5A6C45B8AD233868E423B3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
xClient.Properties.Resources.resources
information
[NBF]root.Data
[NBF]root.Data-preview.png
Malware Configuration - QuasarRAT config.
Config. Field
Value
Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Conf. AES-Key

0Y3FE4bchmcfKuzJOyM6

Version

1.3.0.0

Port

Host

193.106.196.220

ReconnectDelay

3000

Key

1WvgEMPjdwfqIMeM9MclyQ==

AuthKey

NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==

SubDirectory

SubDir

InstallName

kygo.exe

Install

1

Startup

0

Mutex

QSR_MUTEX_PdkG9u

StartupKey

Quasar Client St

HideFile

0

EnableLogger

1

Tag

Office04

LogDirectory

Logs

HideLogDirectory

1

HideLogSubdirectory

0

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

896

Main Method

System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::溰�쭺뉬ᇃ纀扨틒፴ꆋ啸䮴ꄂ琅ሚ�耾⅒䔑閳(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean ĺᅔꁈ�㳡궻篳虌掜ꦶ^ᗱꩃ씓ۢ䂦::ኾソ쭬ኑ㖛ﬗ뷘톝캿㉆賈ꖶ朸꼦瓟㊈() brfalse.s IL_0040: call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() call System.Boolean �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::첩䝷砧ශ䗄冓됫䃱ᖣ媊끍骩ᆖ圬᳿瑮() brfalse.s IL_0040: call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() call System.Boolean ♏ጸ渡誫ጷ䨏‌ճ埍⽖ꂖ间蛛ᩄ끞쑜ꥡ貮::get_Exiting() brtrue.s IL_0040: call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() ldsfld ♏ጸ渡誫ጷ䨏‌ճ埍⽖ꂖ间蛛ᩄ끞쑜ꥡ貮 �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::爈뫦菡ꔄꔖ⋏ꎎꟹ儗⛄䧏鵫ﭠ㈇㐊㻰搽괟꼠 callvirt System.Void ♏ጸ渡誫ጷ䨏‌ճ埍⽖ꂖ间蛛ᩄ끞쑜ꥡ貮::났㻅頔ꛘ�쐇濧텚⚥�ꩍ⛃뛶ꜱ产폘∀ꊅ᯹() call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::뿇䖸➜홹좽困潟砝텨멝ꣵ붣︛ಗ햀Ḫ錛璢㑹() ret <null>

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

896

Main Method

System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::溰�쭺뉬ᇃ纀扨틒፴ꆋ啸䮴ꄂ琅ሚ�耾⅒䔑閳(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean ĺᅔꁈ�㳡궻篳虌掜ꦶ^ᗱꩃ씓ۢ䂦::ኾソ쭬ኑ㖛ﬗ뷘톝캿㉆賈ꖶ朸꼦瓟㊈() brfalse.s IL_0040: call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() call System.Boolean �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::첩䝷砧ශ䗄冓됫䃱ᖣ媊끍骩ᆖ圬᳿瑮() brfalse.s IL_0040: call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() call System.Boolean ♏ጸ渡誫ጷ䨏‌ճ埍⽖ꂖ间蛛ᩄ끞쑜ꥡ貮::get_Exiting() brtrue.s IL_0040: call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() ldsfld ♏ጸ渡誫ጷ䨏‌ճ埍⽖ꂖ间蛛ᩄ끞쑜ꥡ貮 �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::爈뫦菡ꔄꔖ⋏ꎎꟹ儗⛄䧏鵫ﭠ㈇㐊㻰搽괟꼠 callvirt System.Void ♏ጸ渡誫ጷ䨏‌ճ埍⽖ꂖ间蛛ᩄ끞쑜ꥡ貮::났㻅頔ꛘ�쐇濧텚⚥�ꩍ⛃뛶ꜱ产폘∀ꊅ᯹() call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::雌ྏ崔۶ᅐ꣈集뉄밥蘬ਝꪄ퓧�층೥ᥠↅ() call System.Void �벀莴Ỿ딚␰픎뤏東멑ꂠ颬専驜ﵹ⪏韅녔::뿇䖸➜홹좽困潟砝텨멝ꣵ붣︛ಗ햀Ḫ錛璢㑹() ret <null>

Artefacts
Name
Value
CnC

193.106.196.220

Port

6b015602c760995d2e62698614209aff (356.35 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
xClient.Properties.Resources.resources
information
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
Malware Configuration - QuasarRAT config.
Config. Field
Value
Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Conf. AES-Key

0Y3FE4bchmcfKuzJOyM6

Version

1.3.0.0

Port

Host

193.106.196.220

ReconnectDelay

3000

Key

1WvgEMPjdwfqIMeM9MclyQ==

AuthKey

NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==

SubDirectory

SubDir

InstallName

kygo.exe

Install

1

Startup

0

Mutex

QSR_MUTEX_PdkG9u

StartupKey

Quasar Client St

HideFile

0

EnableLogger

1

Tag

Office04

LogDirectory

Logs

HideLogDirectory

1

HideLogSubdirectory

0

Artefacts
Name
Value Location
CnC

193.106.196.220

Malicious

6b015602c760995d2e62698614209aff

Port

Malicious

6b015602c760995d2e62698614209aff

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙