Malicious
Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

PE Executable
|
MD5: 7dec3ad2ec3b95c5c05ff839c89cae0e
|
Size: 71.68 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
7dec3ad2ec3b95c5c05ff839c89cae0e
Sha1
861d2108dd0b9a42ffccc0192f812ebf5feb87ab
Sha256
2d12bab46846db6a3d72f34c3567eea47ef55552fc076f7d038595c5a8a93e0b
Sha384
477dd446e1b3bb07405de6d7fc7df65fc6f54cce7bf9774bae48c6b71e531cc3505b430ae3acc2d69b4b6c008ecd3779
Sha512
af442c3e832a009897053a80386d74694971a74d779550afc51c55e33bee81fe26581575398701cee9bdcffb6283d21bb1337a852ef736c32f2e490bf9625f8b
SSDeep
1536:pPEIo5L6pR0zpKAGbbMwuK2baGkujn/nVclN:xy5L6pR2pDGbbMt3Kujn/VY
TLSH
1D636C002798CA65E1AD4AF8ADE2960106B5C6772102DB5E7CC414DF6B9FFC649233EF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ckh3SHF6Vm1SWkpHZ09vZko3SXhJaERLVGNmODR2dVg=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVAKAAD/SurGzixOhqLGBOobqogcoTMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDczMDE2MDAzNFoXDTM2MDUwODE2MDAzNFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJygeMMS0Eky6soRjVpJncMJvGjNgnGiKLCBDMTmZBPuqoKlp/FJSfO1tkK80BgDAR7JPAo4kUq0Q67UzlLrMBI55WSZ42FqNch/8syD+YJnb4l9BDCfsiVfn0gxPqNohKwohtejFsMyzT7bVXjx8+MF1yehWgqbpzQLE9fX+3K3AgMBAAGjMjAwMB0GA1UdDgQWBBTkZtw3jYmWNyJBHmhQKHdLTEkuVzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAFujYCRjoUzFA6XMARCuvELNJ+9JInrUWdGSDHSzd58SkReUeDmuAPYaZVfnzexYDQ9rxa/UT6CX/nkMnZjXGdkStbkdKRb5FDT8BkvjLdyrqP8ES8K2qXngvdkSmfWz+bGQShb7Pj+y7eHEReJUkTnxu3E1tGItlMMZWP1fYCX8

ServerSignature

Mq7Ou3Faz4HniVtcVlwMSWBjqlnl/9xy2pHNGAAq1lvdrGUr7AlcnlPrDlAHz/qQFZasbkPvrBEYUvdjO6dNM9RIJD14VjYsCMD9v6JR+3FGEPU9jvzHj/+AA3TfezxVJYxAbl12aFhxcIU3HH8p6vU/NSChKCfbSkDX48SN8m4=

Install

true

BDOS

true

Anti-VM

false

Install File

Microsoft.exe

Install-Folder

%AppData%

Hosts

akram.in.net,www.akram.in.net

Ports

53,80,443,1604,8080

Mutex

lao-w3k02-j42ika

Version

1.0.7

Delay

1

Group

Setup

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Microsoft.exe

Full Name

Microsoft.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Microsoft.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Microsoft

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Microsoft.exe

Full Name

Microsoft.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Microsoft.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Microsoft

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

ckh3SHF6Vm1SWkpHZ09vZko3SXhJaERLVGNmODR2dVg=

CnC

akram.in.net

CnC

www.akram.in.net

Ports

53

Ports

80

Ports

443

Ports

1604

Ports

8080

Mutex

lao-w3k02-j42ika

7dec3ad2ec3b95c5c05ff839c89cae0e (71.68 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ckh3SHF6Vm1SWkpHZ09vZko3SXhJaERLVGNmODR2dVg=

Pastebin

-

Certificate

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

ServerSignature

Mq7Ou3Faz4HniVtcVlwMSWBjqlnl/9xy2pHNGAAq1lvdrGUr7AlcnlPrDlAHz/qQFZasbkPvrBEYUvdjO6dNM9RIJD14VjYsCMD9v6JR+3FGEPU9jvzHj/+AA3TfezxVJYxAbl12aFhxcIU3HH8p6vU/NSChKCfbSkDX48SN8m4=

Install

true

BDOS

true

Anti-VM

false

Install File

Microsoft.exe

Install-Folder

%AppData%

Hosts

akram.in.net,www.akram.in.net

Ports

53,80,443,1604,8080

Mutex

lao-w3k02-j42ika

Version

1.0.7

Delay

1

Group

Setup

Artefacts
Name
Value Location
Key (AES_256)

ckh3SHF6Vm1SWkpHZ09vZko3SXhJaERLVGNmODR2dVg=

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

CnC

akram.in.net

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

CnC

www.akram.in.net

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

Ports

53

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

Ports

80

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

Ports

443

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

Ports

1604

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

Ports

8080

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

Mutex

lao-w3k02-j42ika

Malicious

7dec3ad2ec3b95c5c05ff839c89cae0e

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙