Symbol Obfuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 75128da49aa260ffecdbc797347ea0ef
|
| Sha1 | 7148f625d533228125b93bd1066f02ef978d8417
|
| Sha256 | 526997b4cd3ae1f931034709af9a787bdec83dcbf541fbcd898922b0b56f15c3
|
| Sha384 | a032d6ab86091277bb38d84fd2759944816fa6f59ed951ba5600e6b9e1f09b5f44e16c794d543be17743d039b0eaeada
|
| Sha512 | 42a4e45e3a93d9047cb291df61509067f4057c313143778eb9f37602add2592801bca92b75b3cc2203d3ee78dcc18abd22cf088795640c6fcb0930c8481a85f6
|
| SSDeep | 384:Xee+ysro7ww0heDU936QLIeDfYN+oQ793bayse3QxnC7M+WJgIuucCcrmj5EQ+:Xee+20heDojUe0YjRbJABWWeg2Q+
|
| TLSH | 48E23A0573E49816E1FD4B799C3292009336BA879933DB9D1EC854AE6A23788CF14FF5
|
|
Config. Field0 | Value |
|---|---|
| Key (AES_256) | TXlTdXBlclNlY3JldEtleTIwMjYhQCM0NTY= |
| Pastebin | - |
| Install | false |
| Install File | AsyncRAT.exe |
| Install-Folder | %Certificate% |
| Version | 0.5.7B |
| Hosts | bcfoodshop.com |
| Mutex | AppData |
| Delay | 0 |
| Group | TestVT |
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | PDB Path: D:\Cong Viec\malware\AsyncRAT-C-Sharp\malware chuan 2\AsyncRAT-C-Sharp-master\AsyncRAT-C#\Client\obj\Debug\MalwareRAT.pdb |
| Module Name | MalwareRAT.exe |
| Full Name | MalwareRAT.exe |
| EntryPoint | System.Void Client.Program::Main() |
| Scope Name | MalwareRAT.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | MalwareRAT |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.8 |
| Total Strings | 188 |
| Main Method | System.Void Client.Program::Main() |
| Main IL Instruction Count | 101 |
| Main IL | nop <null> ldc.i4.0 <null> stloc.0 <null> br.s IL_0016: ldloc.0 nop <null> ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) nop <null> nop <null> ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) clt <null> stloc.1 <null> ldloc.1 <null> brtrue.s IL_0005: nop call System.Boolean Client.Settings::InitializeSettings() ldc.i4.0 <null> ceq <null> stloc.2 <null> ldloc.2 <null> brfalse.s IL_003A: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> nop <null> nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() ldc.i4.0 <null> ceq <null> stloc.3 <null> ldloc.3 <null> brfalse.s IL_004F: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) stloc.s V_4 ldloc.s V_4 brfalse.s IL_0065: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() nop <null> ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) stloc.s V_5 ldloc.s V_5 brfalse.s IL_007B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() nop <null> ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse.s IL_008E: ldc.i4.0 call System.Boolean Client.Helper.Methods::IsAdmin() br.s IL_008F: stloc.s V_6 ldc.i4.0 <null> stloc.s V_6 ldloc.s V_6 brfalse.s IL_009B: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() nop <null> call System.Void Client.Helper.Methods::PreventSleep() nop <null> nop <null> leave.s IL_00A9: br.s IL_00DD pop <null> nop <null> nop <null> leave.s IL_00A9: br.s IL_00DD br.s IL_00DD: ldc.i4.1 nop <null> nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() ldc.i4.0 <null> ceq <null> stloc.s V_7 ldloc.s V_7 brfalse.s IL_00C9: nop nop <null> call System.Void Client.Connection.ClientSocket::Reconnect() nop <null> call System.Void Client.Connection.ClientSocket::InitializeClient() nop <null> nop <null> nop <null> leave.s IL_00D1: ldc.i4 5000 pop <null> nop <null> nop <null> leave.s IL_00D1: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) nop <null> nop <null> ldc.i4.1 <null> stloc.s V_8 br.s IL_00AB: nop |
|
Name0 | Value |
|---|---|
| Key (AES_256) | TXlTdXBlclNlY3JldEtleTIwMjYhQCM0NTY= |
| CnC | bcfoodshop.com |
| Mutex | AppData |
|
Config. Field0 | Value |
|---|---|
| Key (AES_256) | TXlTdXBlclNlY3JldEtleTIwMjYhQCM0NTY= |
| Pastebin | - |
| Install | false |
| Install File | AsyncRAT.exe |
| Install-Folder | %Certificate% |
| Version | 0.5.7B |
| Hosts | bcfoodshop.com |
| Mutex | AppData |
| Delay | 0 |
| Group | TestVT |
|
Name0 | Value | Location |
|---|---|---|
| Key (AES_256) | TXlTdXBlclNlY3JldEtleTIwMjYhQCM0NTY= Malicious |
75128da49aa260ffecdbc797347ea0ef |
| CnC | bcfoodshop.com Malicious |
75128da49aa260ffecdbc797347ea0ef |
| Mutex | AppData Malicious |
75128da49aa260ffecdbc797347ea0ef |