Malicious
Malicious

70652bd2a24b1dfaee37c007cc89a60f

PE Executable
|
MD5: 70652bd2a24b1dfaee37c007cc89a60f
|
Size: 133.63 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
70652bd2a24b1dfaee37c007cc89a60f
Sha1
59b402494e1d5b0e3731a24cdfbe9cd081f4d080
Sha256
f838a8791934eced1736846c2cc859ec3048c16c7c27826ce10c7159233b284a
Sha384
81d2ef6ec6b225483edbcff18d6de831e9142741c276ba00117ab1c07f804b3efe3655b17ceaf53d02c49eab7a2a235d
Sha512
0f5a5c8066cf35d92e93178f2a268d62e0305f6dcc33e352bec81671c60c61d2c9277a139b9f9ccd66fbd7fb4ee9e908d9b5e96903136a5cab7c8d9cab190472
SSDeep
1536:EUZnnDU12K+tz2yR5EkGbbKiq9fGOpLzanbVclN:EUZDU12K+tKS5JGbbK3xlunRY
TLSH
C3D34D0027C4C7B3EDD965BF9F53C203016F9BA613B18E096C80258E766AE8765D399F

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

cjEwZEd3YWhYNE1JMlRoelM4djhMQ25DZVNOVGFDZ0o=

Pastebin

-

Certificate

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

ServerSignature

jQra8ViooNvGBgyBl+nSSrBjFtN7vEEVwnO5SauQumYy4bHdYkfjDlALlKJJZhyQAyomaq6krTfsElmH1IGQfNHFwfoevQYy2hkRjdxhHsuKKfNPAUOliW9H5X0EqwksSXA28vR/+6XM6J+jLNxiq/9GJ5eIIU1f

Install

false

BDOS

false

Anti-VM

false

Install File

google_register.exe

Install-Folder

%AppData%

Ports

444,1604,4782,5552,6606,7707,8080,8848,8888,9527

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Jerusalem.exe

Full Name

Jerusalem.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Jerusalem.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Jerusalem

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Jerusalem.exe

Full Name

Jerusalem.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Jerusalem.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Jerusalem

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

cjEwZEd3YWhYNE1JMlRoelM4djhMQ25DZVNOVGFDZ0o=

Ports

444

Ports

1604

Ports

4782

Ports

5552

Ports

6606

Ports

7707

Ports

8080

Ports

8848

Ports

8888

Ports

9527

Mutex

DcRatMutex_qwqda

70652bd2a24b1dfaee37c007cc89a60f (133.63 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

cjEwZEd3YWhYNE1JMlRoelM4djhMQ25DZVNOVGFDZ0o=

Pastebin

-

Certificate

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

ServerSignature

jQra8ViooNvGBgyBl+nSSrBjFtN7vEEVwnO5SauQumYy4bHdYkfjDlALlKJJZhyQAyomaq6krTfsElmH1IGQfNHFwfoevQYy2hkRjdxhHsuKKfNPAUOliW9H5X0EqwksSXA28vR/+6XM6J+jLNxiq/9GJ5eIIU1f

Install

false

BDOS

false

Anti-VM

false

Install File

google_register.exe

Install-Folder

%AppData%

Ports

444,1604,4782,5552,6606,7707,8080,8848,8888,9527

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

cjEwZEd3YWhYNE1JMlRoelM4djhMQ25DZVNOVGFDZ0o=

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

444

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

1604

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

4782

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

5552

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

6606

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

7707

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

8080

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

8848

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

8888

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Ports

9527

Malicious

70652bd2a24b1dfaee37c007cc89a60f

Mutex

DcRatMutex_qwqda

Malicious

70652bd2a24b1dfaee37c007cc89a60f

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙