Malicious
Malicious

878e4e5c5badd8894c2e4e58e0821a9c

PE Executable
|
MD5: 878e4e5c5badd8894c2e4e58e0821a9c
|
Size: 1.68 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
878e4e5c5badd8894c2e4e58e0821a9c
Sha1
d277c324f3dfea62b7085ce33140f7057e341340
Sha256
ed29ad4d8d35bc2559a44196300367ef6b073847f7174f61dfa421c9a6d296ac
Sha384
5f62f1d83489ddcadf922708fc9bd30c07d0139e3fdf51b01ec4ed20b3e0baec9b967ef3a3bd733201ba3738a26e803d
Sha512
c23e650949a154bcba3de3c8132d03995ff647276fb6240c500ee34f32637a7db94dadb1dbb28204f3ff8b85db3bbbb1e3aa9588d79492b9ab79e61bb18140b0
SSDeep
24576:lg+o7K5G92x95MER+A3EDs8H3dIRaAL00z4pIsBaZA1h/ZpTEgJL2Q5eD0YL6oUT:lg+oX9MogydYaAvNYaZA1tZp7L2d8V
TLSH
E2759D017E45CE11F0091A33C3EF858847B49951AAA6E71B7DBA377E65123A73C0DACB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
EIfiHnusBQuWxYFQmV.l1dN93FIZ1NBpWi1GI
GcHir6NjBi4UhlP2de.PnuriRZLGMdKkQGVAU
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

GDUJOtXlrLb23LydxqTQSDwjSKjMEPKTtzXBkx

Full Name

GDUJOtXlrLb23LydxqTQSDwjSKjMEPKTtzXBkx

EntryPoint

System.Void siS8RrqUbFNLT6VKoib.VQV3OiqA0dQAM7xJiM7::WbrG4tue86()

Scope Name

GDUJOtXlrLb23LydxqTQSDwjSKjMEPKTtzXBkx

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XqPZAR87ZnQ0ZquhDQu1EJKhbBIIDxx39

Assembly Version

9.9.5.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void siS8RrqUbFNLT6VKoib.VQV3OiqA0dQAM7xJiM7::WbrG4tue86()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void wM5VdQGeQggsEKSRqCC.FgUVgvGmrhXiWqB6j2Q::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object siS8RrqUbFNLT6VKoib.VQV3OiqA0dQAM7xJiM7::tgOGPhjT5b callvirt System.Void Op9W6XqmG9JfHZAafhi.fxqxXfqVyFZEDHK9MFZ::b4lLNo81dS() nop <null> ret <null>

Module Name

GDUJOtXlrLb23LydxqTQSDwjSKjMEPKTtzXBkx

Full Name

GDUJOtXlrLb23LydxqTQSDwjSKjMEPKTtzXBkx

EntryPoint

System.Void siS8RrqUbFNLT6VKoib.VQV3OiqA0dQAM7xJiM7::WbrG4tue86()

Scope Name

GDUJOtXlrLb23LydxqTQSDwjSKjMEPKTtzXBkx

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XqPZAR87ZnQ0ZquhDQu1EJKhbBIIDxx39

Assembly Version

9.9.5.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void siS8RrqUbFNLT6VKoib.VQV3OiqA0dQAM7xJiM7::WbrG4tue86()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void wM5VdQGeQggsEKSRqCC.FgUVgvGmrhXiWqB6j2Q::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object siS8RrqUbFNLT6VKoib.VQV3OiqA0dQAM7xJiM7::tgOGPhjT5b callvirt System.Void Op9W6XqmG9JfHZAafhi.fxqxXfqVyFZEDHK9MFZ::b4lLNo81dS() nop <null> ret <null>

878e4e5c5badd8894c2e4e58e0821a9c (1.68 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
EIfiHnusBQuWxYFQmV.l1dN93FIZ1NBpWi1GI
GcHir6NjBi4UhlP2de.PnuriRZLGMdKkQGVAU
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙