Malicious
Malicious

85700f51c13481313d4c10c292969b1b

PE Executable
|
MD5: 85700f51c13481313d4c10c292969b1b
|
Size: 66.05 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
85700f51c13481313d4c10c292969b1b
Sha1
bdf21e46eea363c2dad4e939a3ef9d5519437989
Sha256
0c73c1f191c2e4a3d5399532c014fcdffedfe7bd4abc9887bd0965f8d86abf3f
Sha384
30a9c28d796dc4a39bd582beedab717a470e93feee6e15f8720da8415a82e10647adec224358c3e0d1a08ad85e51884e
Sha512
755df98a417e5b9f31166395cac740e685425be34d7ff41c31b7dc8d4a5ea05e5603c89caa6154c64ba27f76883f109271db310e67bc709de9e88ba81ab2f831
SSDeep
768:7MtY1C6xgPiPlmJig9J27lGfEljiZvx3ozO4W1+jiSCv7mqb2nrpwB1otQEUUcO+:7pxBq4rjHzO4WYGbbQwGbtcGDRVclN
TLSH
17534A00279CC965E2AE4AF4ACF2950106B1D9772106DA5E7CC414DBABAEFC649133FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ZmpxZm1RYW5Xd2xFV3FQWW9BSHdxU1ZEVExXR0pRS1M=

Pastebin

-

Certificate

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

ServerSignature

q8AtMEdSTFBKcmiVCNB7F3RYMVUlI/QuVDBl9okMEFyu66p3OfA+HGNqEHzkOofKdJM7BJwHbf/81iNQokLqrPuDgAvE1DL48Hr7y9pDP8GUeNNisrp+gGFWG4lyj5sBOJXhRnEVnkGb4TvfR/QBfz7dNg6/y6siTtzT7MFQYtY=

Install

true

BDOS

false

Anti-VM

false

Install File

LumoraEndpointDefender.exe

Install-Folder

%AppData%

Hosts

bajaban.sa.com,kubetchuan.com,vb0.za.com,789club.za.com

Ports

80,443,4444,4782,5555,6060,6666,8080,8848

Mutex

LCT_LumoraEndpoint_DefenderLock_8a9b0c1d

Version

1.0.7

Delay

1

Group

LCT

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

LumoraEndpointDefender.exe

Full Name

LumoraEndpointDefender.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

LumoraEndpointDefender.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

LumoraEndpointDefender

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

LumoraEndpointDefender.exe

Full Name

LumoraEndpointDefender.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

LumoraEndpointDefender.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

LumoraEndpointDefender

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

ZmpxZm1RYW5Xd2xFV3FQWW9BSHdxU1ZEVExXR0pRS1M=

CnC

bajaban.sa.com

CnC

kubetchuan.com

CnC

vb0.za.com

CnC

789club.za.com

Ports

80

Ports

443

Ports

4444

Ports

4782

Ports

5555

Ports

6060

Ports

6666

Ports

8080

Ports

8848

Mutex

LCT_LumoraEndpoint_DefenderLock_8a9b0c1d

85700f51c13481313d4c10c292969b1b (66.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ZmpxZm1RYW5Xd2xFV3FQWW9BSHdxU1ZEVExXR0pRS1M=

Pastebin

-

Certificate

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

ServerSignature

q8AtMEdSTFBKcmiVCNB7F3RYMVUlI/QuVDBl9okMEFyu66p3OfA+HGNqEHzkOofKdJM7BJwHbf/81iNQokLqrPuDgAvE1DL48Hr7y9pDP8GUeNNisrp+gGFWG4lyj5sBOJXhRnEVnkGb4TvfR/QBfz7dNg6/y6siTtzT7MFQYtY=

Install

true

BDOS

false

Anti-VM

false

Install File

LumoraEndpointDefender.exe

Install-Folder

%AppData%

Hosts

bajaban.sa.com,kubetchuan.com,vb0.za.com,789club.za.com

Ports

80,443,4444,4782,5555,6060,6666,8080,8848

Mutex

LCT_LumoraEndpoint_DefenderLock_8a9b0c1d

Version

1.0.7

Delay

1

Group

LCT

Artefacts
Name
Value Location
Key (AES_256)

ZmpxZm1RYW5Xd2xFV3FQWW9BSHdxU1ZEVExXR0pRS1M=

Malicious

85700f51c13481313d4c10c292969b1b

CnC

bajaban.sa.com

Malicious

85700f51c13481313d4c10c292969b1b

CnC

kubetchuan.com

Malicious

85700f51c13481313d4c10c292969b1b

CnC

vb0.za.com

Malicious

85700f51c13481313d4c10c292969b1b

CnC

789club.za.com

Malicious

85700f51c13481313d4c10c292969b1b

Ports

80

Malicious

85700f51c13481313d4c10c292969b1b

Ports

443

Malicious

85700f51c13481313d4c10c292969b1b

Ports

4444

Malicious

85700f51c13481313d4c10c292969b1b

Ports

4782

Malicious

85700f51c13481313d4c10c292969b1b

Ports

5555

Malicious

85700f51c13481313d4c10c292969b1b

Ports

6060

Malicious

85700f51c13481313d4c10c292969b1b

Ports

6666

Malicious

85700f51c13481313d4c10c292969b1b

Ports

8080

Malicious

85700f51c13481313d4c10c292969b1b

Ports

8848

Malicious

85700f51c13481313d4c10c292969b1b

Mutex

LCT_LumoraEndpoint_DefenderLock_8a9b0c1d

Malicious

85700f51c13481313d4c10c292969b1b

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙