Suspicious
Suspect

7b044369fad1ca21c404364a89febb6a

PE Executable
|
MD5: 7b044369fad1ca21c404364a89febb6a
|
Size: 52.22 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
7b044369fad1ca21c404364a89febb6a
Sha1
f942cc721c79c07420a8f7f8156cd53645d6c45b
Sha256
4b8732ba48e279bad32a8e2c4f8fa46285b65f8a965e8005a6f991f924e1d9eb
Sha384
35fb25b387cfe888d3efad78c95e40d3709db542f838986e9b4d2968bcc4117260241072ac371cccfbf21f0f2df1188f
Sha512
d6ea1335b8b5f5a9553c3bedb9bc9387432ab1149353b50ef8f108421efe28fc108e67b38903a63110dbb222e4db992dc114567bc4b24ca87ffd81456b011429
SSDeep
768:3xcJTF0Q4uRuzb/qFBl8b61+d+zgH3Be6kA0pLlEIq6USQycL8hqk9:YZ0QHB18bJqgH3nkFpxTncQh9
TLSH
AB33281CB6CC9A62C2FE0FBE94E372810778E475E74BE30B254C15B51E167DB9812A87

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
{86618a87-64af-46ac-8f26-308d23ad047c}
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Cdinybx

Full Name

Cdinybx

EntryPoint

System.Void .::()

Scope Name

Cdinybx

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Cdinybx

Assembly Version

1.0.1137.6231

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

69

Main Method

System.Void .::()

Main IL Instruction Count

82

Main IL

br IL_00F4: newobj System.Void ./::.ctor() br IL_00FE: stloc.0 ldstr C04ysHg8+kEKdhZJ5rXI7Q== br IL_0104: stloc.1 ldc.i4.3 <null> brfalse.s IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ldstr Tcdd07kI1vw= br IL_010A: stloc.2 ldsfld System.Func`1<System.Byte[]> ./:: dup <null> brtrue.s IL_0040: br IL_0110 pop <null> ldsfld ./ ./:: ldftn System.Byte[] ./::() newobj System.Void System.Func`1<System.Byte[]>::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Func`1<System.Byte[]> ./:: br IL_0110: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_011A: ldloc.0 br IL_0120: ldloc.1 br IL_0126: ldloc.2 br IL_012C: newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: ldloc.0 <null> newobj System.Void .::.ctor() stfld . ./:: ldloc.0 <null> ldstr eG6GyWyFd8kCOlTaYZ.KgZJKmMwvYgDkE7WvZ ldstr m8DdcWaDI newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: dup <null> ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.Reflection.Assembly) newobj System.Void System.Action`1<System.Reflection.Assembly>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.Reflection.Assembly>) ldloc.0 <null> ldfld . ./:: ldsfld System.Action ./:: dup <null> brtrue.s IL_00E3: callvirt System.Void .::(System.Action) pop <null> ldsfld ./ ./:: ldftn System.Void ./::() newobj System.Void System.Action::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Action ./:: callvirt System.Void .::(System.Action) call System.Void .::(.) ldc.i4.3 <null> brfalse IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ret <null> newobj System.Void ./::.ctor() br IL_0005: br IL_00FE stloc.0 <null> br IL_000A: ldstr "C04ysHg8+kEKdhZJ5rXI7Q==" stloc.1 <null> br IL_0014: ldc.i4.3 stloc.2 <null> br IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_0045: br IL_011A ldloc.0 <null> br IL_004A: br IL_0120 ldloc.1 <null> br IL_004F: br IL_0126 ldloc.2 <null> br IL_0054: br IL_012C newobj System.Void .::.ctor(System.String,System.String) br IL_0059: stfld . ./::

Module Name

Cdinybx

Full Name

Cdinybx

EntryPoint

System.Void .::()

Scope Name

Cdinybx

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Cdinybx

Assembly Version

1.0.1137.6231

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

69

Main Method

System.Void .::()

Main IL Instruction Count

82

Main IL

br IL_00F4: newobj System.Void ./::.ctor() br IL_00FE: stloc.0 ldstr C04ysHg8+kEKdhZJ5rXI7Q== br IL_0104: stloc.1 ldc.i4.3 <null> brfalse.s IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ldstr Tcdd07kI1vw= br IL_010A: stloc.2 ldsfld System.Func`1<System.Byte[]> ./:: dup <null> brtrue.s IL_0040: br IL_0110 pop <null> ldsfld ./ ./:: ldftn System.Byte[] ./::() newobj System.Void System.Func`1<System.Byte[]>::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Func`1<System.Byte[]> ./:: br IL_0110: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_011A: ldloc.0 br IL_0120: ldloc.1 br IL_0126: ldloc.2 br IL_012C: newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: ldloc.0 <null> newobj System.Void .::.ctor() stfld . ./:: ldloc.0 <null> ldstr eG6GyWyFd8kCOlTaYZ.KgZJKmMwvYgDkE7WvZ ldstr m8DdcWaDI newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: dup <null> ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.Reflection.Assembly) newobj System.Void System.Action`1<System.Reflection.Assembly>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.Reflection.Assembly>) ldloc.0 <null> ldfld . ./:: ldsfld System.Action ./:: dup <null> brtrue.s IL_00E3: callvirt System.Void .::(System.Action) pop <null> ldsfld ./ ./:: ldftn System.Void ./::() newobj System.Void System.Action::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Action ./:: callvirt System.Void .::(System.Action) call System.Void .::(.) ldc.i4.3 <null> brfalse IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ret <null> newobj System.Void ./::.ctor() br IL_0005: br IL_00FE stloc.0 <null> br IL_000A: ldstr "C04ysHg8+kEKdhZJ5rXI7Q==" stloc.1 <null> br IL_0014: ldc.i4.3 stloc.2 <null> br IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_0045: br IL_011A ldloc.0 <null> br IL_004A: br IL_0120 ldloc.1 <null> br IL_004F: br IL_0126 ldloc.2 <null> br IL_0054: br IL_012C newobj System.Void .::.ctor(System.String,System.String) br IL_0059: stfld . ./::

7b044369fad1ca21c404364a89febb6a (52.22 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
{86618a87-64af-46ac-8f26-308d23ad047c}
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙