Malicious
Malicious

74bb3514f737d1386b7ced741ec1e098

PE Executable
|
MD5: 74bb3514f737d1386b7ced741ec1e098
|
Size: 50.18 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
74bb3514f737d1386b7ced741ec1e098
Sha1
25de16039754b3870676911b146a956d30b2e8fa
Sha256
02aa8cabeea2a0120a31adbf0886f821d10953fc6d4d9cd1959568093c48b04d
Sha384
e1ba874ff8b35b48efb481702ad19f72eb5455c5a39b09ba5089661d6e0c1db8de0a35824eef696e934e99d2f3546bf5
Sha512
e3ca588f86914dc24762e780ca947fb455e66a48a0c26b5d23e4bbbcb2c0bef0c61c9b33d7ad20ce019f40f227bcebaab649cc01758f428df66dfafde738fc8a
SSDeep
1536:pukGVT0M912do6EXS3bjXSidtQdN37Nes:puk6T0ML2dzEXS3bjb2L37gs
TLSH
8D332B003BE9C22BF27E4F74A8F25145467AF5673703D64E2C8451975713BC68A42AFE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

MHlaU2pXbWVFQnEzUmQyT3RGNlh1RTFzNzJuTHZvbDY=

Pastebin

-

Certificate

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

ServerSignature

BTe8V52U+MSgRaoROi0Rpn2lnyXa9sOyWxGM9YJKs2m5te2BLaj8nnHu8M/9vLTnYG9BJSN27NEqTA6H6EVixh8r1vm5fu/XdXhOGpHsNLgNHbn5Hqa6p8dNjJnYg2gJu9UnKpTPxq5juqOcF7SX3pdQOIW6qx0QQ2zR/lxZ7HGbRWpi0JVPK+uLjzGb3QV2a4JCCbQe7lMSmP1GH/bcNVlQsXD/iA+7hPA5Pt5vDBYm89BNnAxPq42hAfKIwZxHaXVxd0Yn3ZEFDJvt+bf8xFOLpS7QkqJA0HgcwCyzMej4kbX/5sBp/MVOwblpzWgBHOZn7BPfsIlZscPHkIAZeC9tSprmOhV5vazlcRzENaNzJHascHT4fRsdf/xovB+KPJ1/LAlSqvlkhjE0JowgfjtbkjRFG91dnP0E3AwW4LIu5gtWQR6QoCsra56l9zWCrt49Ggf80SbrwaXVPC+ETKNV8iS7fC9CMla+0wbwWZqaHCVu/1IoWhjwaOYOiwRQBKI1se/Mjs112eDTf+jtOFMj42I4Un/h74eNz9hAn9Y0w4yA1RHu9lWxCOQzg9BOP+NgXBEFT6ucPIGLvlFg8NUHYBIQw7yzXY2qiFZz8fZ2PpQuRv3JkvdccCe9/Ts8CcxS0eMdiODos+VrceJ2CmLPaf58Dwq446VubK7UZbE=

Install

true

BDOS

false

Anti-VM

false

Install File

GoogleKeep.exe

Install-Folder

%AppData%

Hosts

vn168a.link,www.vn168a.link

Ports

80,443,1337,1604,4444,5555,6606,7707,8080,8808

Mutex

WyNvMSPwdQ81

Version

0.5.8

Delay

3

Group

Keep

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Google Keep.exe

Full Name

Google Keep.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Google Keep.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Google Keep

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

120

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

51

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0043: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0057: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() call System.Void Client.Helper.Methods::PreventSleep() leave IL_0099: nop pop <null> leave IL_0099: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00AE: leave IL_00B9 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00B9: ldc.i4 5000 pop <null> leave IL_00B9: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_0099: nop

Module Name

Google Keep.exe

Full Name

Google Keep.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Google Keep.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Google Keep

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

120

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

51

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0043: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0057: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() call System.Void Client.Helper.Methods::PreventSleep() leave IL_0099: nop pop <null> leave IL_0099: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00AE: leave IL_00B9 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00B9: ldc.i4 5000 pop <null> leave IL_00B9: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_0099: nop

Artefacts
Name
Value
Key (AES_256)

MHlaU2pXbWVFQnEzUmQyT3RGNlh1RTFzNzJuTHZvbDY=

CnC

vn168a.link

CnC

www.vn168a.link

Ports

80

Ports

443

Ports

1337

Ports

1604

Ports

4444

Ports

5555

Ports

6606

Ports

7707

Ports

8080

Ports

8808

Mutex

WyNvMSPwdQ81

74bb3514f737d1386b7ced741ec1e098 (50.18 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

MHlaU2pXbWVFQnEzUmQyT3RGNlh1RTFzNzJuTHZvbDY=

Pastebin

-

Certificate

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

ServerSignature

BTe8V52U+MSgRaoROi0Rpn2lnyXa9sOyWxGM9YJKs2m5te2BLaj8nnHu8M/9vLTnYG9BJSN27NEqTA6H6EVixh8r1vm5fu/XdXhOGpHsNLgNHbn5Hqa6p8dNjJnYg2gJu9UnKpTPxq5juqOcF7SX3pdQOIW6qx0QQ2zR/lxZ7HGbRWpi0JVPK+uLjzGb3QV2a4JCCbQe7lMSmP1GH/bcNVlQsXD/iA+7hPA5Pt5vDBYm89BNnAxPq42hAfKIwZxHaXVxd0Yn3ZEFDJvt+bf8xFOLpS7QkqJA0HgcwCyzMej4kbX/5sBp/MVOwblpzWgBHOZn7BPfsIlZscPHkIAZeC9tSprmOhV5vazlcRzENaNzJHascHT4fRsdf/xovB+KPJ1/LAlSqvlkhjE0JowgfjtbkjRFG91dnP0E3AwW4LIu5gtWQR6QoCsra56l9zWCrt49Ggf80SbrwaXVPC+ETKNV8iS7fC9CMla+0wbwWZqaHCVu/1IoWhjwaOYOiwRQBKI1se/Mjs112eDTf+jtOFMj42I4Un/h74eNz9hAn9Y0w4yA1RHu9lWxCOQzg9BOP+NgXBEFT6ucPIGLvlFg8NUHYBIQw7yzXY2qiFZz8fZ2PpQuRv3JkvdccCe9/Ts8CcxS0eMdiODos+VrceJ2CmLPaf58Dwq446VubK7UZbE=

Install

true

BDOS

false

Anti-VM

false

Install File

GoogleKeep.exe

Install-Folder

%AppData%

Hosts

vn168a.link,www.vn168a.link

Ports

80,443,1337,1604,4444,5555,6606,7707,8080,8808

Mutex

WyNvMSPwdQ81

Version

0.5.8

Delay

3

Group

Keep

Artefacts
Name
Value Location
Key (AES_256)

MHlaU2pXbWVFQnEzUmQyT3RGNlh1RTFzNzJuTHZvbDY=

Malicious

74bb3514f737d1386b7ced741ec1e098

CnC

vn168a.link

Malicious

74bb3514f737d1386b7ced741ec1e098

CnC

www.vn168a.link

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

80

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

443

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

1337

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

1604

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

4444

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

5555

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

6606

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

7707

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

8080

Malicious

74bb3514f737d1386b7ced741ec1e098

Ports

8808

Malicious

74bb3514f737d1386b7ced741ec1e098

Mutex

WyNvMSPwdQ81

Malicious

74bb3514f737d1386b7ced741ec1e098

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙