Malicious
Malicious

73547ceec4d626d65e24a27ae5eb8265

PE Executable
|
MD5: 73547ceec4d626d65e24a27ae5eb8265
|
Size: 66.05 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
73547ceec4d626d65e24a27ae5eb8265
Sha1
d0d498968942faae09437ed5ac654c109899b6a8
Sha256
844abcc08b3576ea64b732efbd69dc5e86e3fe25850f1773f827f397585487dd
Sha384
b4f10383cd9f4408684736646ae833a4f4fdc881314049cf73425e76c48f4745b5549e6ddd9a7debe85c846c8e3dbf2c
Sha512
6b66f76606862ab35a150cf0b609f583ab117436fc6a5eefb1c32472b3f6cc056c4a00f6f7cab11cffc3129e91a01ede6573467abfca2137bf3fea3d1f63b561
SSDeep
768:7v7V1geT4ViP/5Eij9J6TMaX67CGKpIv1+mSCJ7mqb2nzpwH1o/J/QvqVN8GqspI:zNTHhC/njpIv8ybbEw2OvqUGLpVclN
TLSH
63536B003799C925E2AD4AB4BDF2950107B5DAB72102DA5E7CC404DBAB9EFC649123FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

NHI4clppczFMY0daVXdFNnd2SmlUcjFrdDNnelZhZHg=

Pastebin

-

Certificate

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

ServerSignature

PraUF7HI3SVMtDQL2mXGpIM4eRU6FOX3NG6NsQspi7KuD0M3uGCdc5LWiuQ20DWe2GpPDMIIMkPHa3DRSx9CUDfywrfHOzgMUd0tpGhJy0UkGu49j4YTTDN/wGuAcfAXLw3F05YhaDoyRhea+geQSDJHBrWeljKMKU35xlhFNM0=

Install

true

BDOS

false

Anti-VM

false

Install File

googleaccountsvc.exe

Install-Folder

%AppData%

Hosts

af88.uk.net,www.af88.uk.net,www.af88.eu.com,af88.eu.com,www.af88.us.com,af88.us.com,af88.jpn.com,www.af88.jpn.com,af88.cn.com,www.af88.cn.com,www.portal.de.com,portal.de.com,biglobe-auth.jp.net,www.biglobe-auth.jp.net

Ports

80,443,1604,4444,5555,6606,6666,8080,8443

Version

1.0.7

Delay

1

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

googleaccountsvc.exe

Full Name

googleaccountsvc.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

googleaccountsvc.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

googleaccountsvc

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

googleaccountsvc.exe

Full Name

googleaccountsvc.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

googleaccountsvc.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

googleaccountsvc

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

NHI4clppczFMY0daVXdFNnd2SmlUcjFrdDNnelZhZHg=

CnC

af88.uk.net

CnC

www.af88.uk.net

CnC

www.af88.eu.com

CnC

af88.eu.com

CnC

www.af88.us.com

CnC

af88.us.com

CnC

af88.jpn.com

CnC

www.af88.jpn.com

CnC

af88.cn.com

CnC

www.af88.cn.com

CnC

www.portal.de.com

CnC

portal.de.com

CnC

biglobe-auth.jp.net

CnC

www.biglobe-auth.jp.net

Ports

80

Ports

443

Ports

1604

Ports

4444

Ports

5555

Ports

6606

Ports

6666

Ports

8080

Ports

8443

73547ceec4d626d65e24a27ae5eb8265 (66.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

NHI4clppczFMY0daVXdFNnd2SmlUcjFrdDNnelZhZHg=

Pastebin

-

Certificate

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

ServerSignature

PraUF7HI3SVMtDQL2mXGpIM4eRU6FOX3NG6NsQspi7KuD0M3uGCdc5LWiuQ20DWe2GpPDMIIMkPHa3DRSx9CUDfywrfHOzgMUd0tpGhJy0UkGu49j4YTTDN/wGuAcfAXLw3F05YhaDoyRhea+geQSDJHBrWeljKMKU35xlhFNM0=

Install

true

BDOS

false

Anti-VM

false

Install File

googleaccountsvc.exe

Install-Folder

%AppData%

Hosts

af88.uk.net,www.af88.uk.net,www.af88.eu.com,af88.eu.com,www.af88.us.com,af88.us.com,af88.jpn.com,www.af88.jpn.com,af88.cn.com,www.af88.cn.com,www.portal.de.com,portal.de.com,biglobe-auth.jp.net,www.biglobe-auth.jp.net

Ports

80,443,1604,4444,5555,6606,6666,8080,8443

Version

1.0.7

Delay

1

Artefacts
Name
Value Location
Key (AES_256)

NHI4clppczFMY0daVXdFNnd2SmlUcjFrdDNnelZhZHg=

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

af88.uk.net

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

www.af88.uk.net

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

www.af88.eu.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

af88.eu.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

www.af88.us.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

af88.us.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

af88.jpn.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

www.af88.jpn.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

af88.cn.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

www.af88.cn.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

www.portal.de.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

portal.de.com

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

biglobe-auth.jp.net

Malicious

73547ceec4d626d65e24a27ae5eb8265

CnC

www.biglobe-auth.jp.net

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

80

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

443

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

1604

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

4444

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

5555

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

6606

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

6666

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

8080

Malicious

73547ceec4d626d65e24a27ae5eb8265

Ports

8443

Malicious

73547ceec4d626d65e24a27ae5eb8265

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙