Malicious
Malicious

778bdd6287bf74a6f853b09580dce2c2

PE Executable
|
MD5: 778bdd6287bf74a6f853b09580dce2c2
|
Size: 300.89 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
778bdd6287bf74a6f853b09580dce2c2
Sha1
3d47c0683df6fe3a54e13b074e9e7b4fcdbaeef2
Sha256
e5cc4986e18b7b1d7fb722ad4a8ca349e7263305b490db3d65d38746607bd121
Sha384
c3da4bc49edcae56fb8c41f70fd4bd029a907f7e9df307f9a26964be6c8641a23e89b634c3fbca3348ebb0cd7f71ddef
Sha512
9ad6c52b839cea69f22615dd13fa054f3b6bd48b821b764f84886ba49f155e36f3a2fa3f82e334d1179a73d6ed009783e92d16767fbb048a1d3adc877b6b98dd
SSDeep
6144:D7zO0LSclT6FOwEP5Kq+SMv0VGb7bDc+lbkvnqB:DlJtTF9zVGk+lbk/a
TLSH
AC545A2527F8A93BD8BE17B4F53141094B76FC07B517F78E6A5818B82C1A38985837E3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Overlay_6f896056.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
xClient.Properties.Resources.resources
information
[NBF]root.Data
[NBF]root.Data-preview.png
Malware Configuration - QuasarRAT config.
Config. Field
Value
Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Conf. AES-Key

WfypJvFjrwo2JqSjokaC

Version

1.4.0.0

Port

222

Host

51.15.17.193

ReconnectDelay

3000

SubDirectory

1WvgEMPjdwfqIMeM9MclyQ==

InstallName

NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==

Install

7zip

Startup

7z.exe

Mutex

0

StartupKey

0

HideFile

SyhenUemUok7YIvJ

EnableLogger

7z

Tag

0

LogDirectory

1

ServerSignature

TEST2

ServerCertificate

Logs

InstallPath

0

LogsPath

0

UnattendedMod

0

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_6f896056.bin (5463 bytes)

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void xClient.Program::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

1062

Main Method

System.Void xClient.Program::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void xClient.Program::HandleUnhandledException(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean xClient.Config.Settings::Initialize() brfalse.s IL_0040: call System.Void xClient.Program::Cleanup() call System.Boolean xClient.Program::Initialize() brfalse.s IL_0040: call System.Void xClient.Program::Cleanup() call System.Boolean xClient.Core.Networking.QuasarClient::get_Exiting() brtrue.s IL_0040: call System.Void xClient.Program::Cleanup() ldsfld xClient.Core.Networking.QuasarClient xClient.Program::ConnectClient callvirt System.Void xClient.Core.Networking.QuasarClient::Connect() call System.Void xClient.Program::Cleanup() call System.Void xClient.Program::Exit() ret <null>

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void xClient.Program::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

1062

Main Method

System.Void xClient.Program::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void xClient.Program::HandleUnhandledException(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean xClient.Config.Settings::Initialize() brfalse.s IL_0040: call System.Void xClient.Program::Cleanup() call System.Boolean xClient.Program::Initialize() brfalse.s IL_0040: call System.Void xClient.Program::Cleanup() call System.Boolean xClient.Core.Networking.QuasarClient::get_Exiting() brtrue.s IL_0040: call System.Void xClient.Program::Cleanup() ldsfld xClient.Core.Networking.QuasarClient xClient.Program::ConnectClient callvirt System.Void xClient.Core.Networking.QuasarClient::Connect() call System.Void xClient.Program::Cleanup() call System.Void xClient.Program::Exit() ret <null>

Artefacts
Name
Value
CnC

51.15.17.193

Port

222

778bdd6287bf74a6f853b09580dce2c2 (300.89 KB)
File Structure
Overlay_6f896056.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
xClient.Properties.Resources.resources
information
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
Malware Configuration - QuasarRAT config.
Config. Field
Value
Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Conf. AES-Key

WfypJvFjrwo2JqSjokaC

Version

1.4.0.0

Port

222

Host

51.15.17.193

ReconnectDelay

3000

SubDirectory

1WvgEMPjdwfqIMeM9MclyQ==

InstallName

NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==

Install

7zip

Startup

7z.exe

Mutex

0

StartupKey

0

HideFile

SyhenUemUok7YIvJ

EnableLogger

7z

Tag

0

LogDirectory

1

ServerSignature

TEST2

ServerCertificate

Logs

InstallPath

0

LogsPath

0

UnattendedMod

0

Artefacts
Name
Value Location
CnC

51.15.17.193

Malicious

778bdd6287bf74a6f853b09580dce2c2

Port

222

Malicious

778bdd6287bf74a6f853b09580dce2c2

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙