Malicious
Malicious

87ee964282652e2a25407eb6e742713f

PE Executable
|
MD5: 87ee964282652e2a25407eb6e742713f
|
Size: 65.54 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
87ee964282652e2a25407eb6e742713f
Sha1
5f11cc9ae9ce939f9d5a2b97cb46a754a3dbeed8
Sha256
7a77290685b008f799f7d0959f37edb7ad2a9fb3df1bd05cef5e6c792928e66a
Sha384
206c31f2823d627659464c97d41c4d0bdb693ff86bed2b84ab99dc7ffa2c5ddbc72d85ae8d399a1d4afb7ebe45f35f92
Sha512
d6a52be7bd5e598af37cfdfc25fd2f826c3267c6b17b2842fe56263d6d0034d80012d96f0bd1e164d4b664620fd331d9b58d831e2ee9195cb38372108157618c
SSDeep
768:CmUvnkjXf78dwC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oXxNKGGSusdpqKYhg:6wXzLdSJYUbdh97KGxusdpqKmY7
TLSH
33536C003798C966E2AE47B8BCB3550006F1D2B72116DA1E7CC810DB6B9FFC656526FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Overlay_0f343b09.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

R2hNNVQxa2dUWXZpdXExNEJHTkZKRWljNDF5NExtRHU=

Ports

6565

Hosts

194.59.31.27

Version

Install

false

Install-Folder

%AppData%

Install File

�

Mutex

德lΔ杰Xe弗德伊ΙRΒΑfרam

Certificate

MIICKTCCAZKgAwIBAgIVAPS4iiWNYsCv6s/955uO1LraC5A9MA0GCSqGSIb3DQEBDQUAMF0xDjAMBgNVBAMMBUVCT0xBMRMwEQYDVQQLDApxd3FkYW5jaHVuMRwwGgYDVQQKDBNEY1JhdCBCeSBxd3FkYW5jaHVuMQswCQYDVQQHDAJTSDELMAkGA1UEBhMCQ04wHhcNMjQxMDI4MTEwOTM1WhcNMzUwODA3MTEwOTM1WjAQMQ4wDAYDVQQDDAVEY1JhdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAhYZTgmUSw5uQRbarBnd62FNQ1JCIpXR4pDMSCmvFmelkgCxJpZOoGuLEmvHcTwmoi8Hmzu5+hMHEf3uwQ4xpZdUQb3O3rFQ/sN0VwlnoeKI1JSxZ1BgJKnCwC4wpmgkih1MEhf+Xo7njSqjoyJz6R7KKnfeLE5YW5gM6KY3PxO0CAwEAAaMyMDAwHQYDVR0OBBYEFP+uyHIlSuDuFRB1kEAjRLvyU1klMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEAVODo/nDlbxB3WWUlkDdxiE3ORn90BYiY9hZHKNcLRJWWJS5JdzmNBaHtx9FUxxBolS1v2x4HcGxz5fdC9x2Ge2sJGzTWxyJhl/5UirYEqaXEIGXhv+qK4jDpR8ollrOYEGzxO3vqm4SizyzMaKGX5gBeuwicoOXH2BQ6

ServerSignature

E2tfUHPRrSW3fKya8bg7859yUhfkqWXaodPfl44xB9ZjhcV4NePgYH/eOBfKvbwrJ6lK2F9AEwt6Ei9idDZUvV2KTT5oMrIHocnR7cOP/6fWJ5EPNg6SH8amkwmXJKLkfa4G0VVJ6+PNYE/5z6SN7JEPW+V9zONG

Anti-VM

null

PasteBin

false

BDOS

1

Delay

Default

Group

false

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_0f343b09.bin (1024 bytes)

Module Name

Infected.exe

Full Name

Infected.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Infected.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Infected

Assembly Version

3.6.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

163

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.Bjifos::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProdfceassC1sritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Mesth4ods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Infected.exe

Full Name

Infected.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Infected.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Infected

Assembly Version

3.6.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

163

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.Bjifos::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProdfceassC1sritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Mesth4ods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

R2hNNVQxa2dUWXZpdXExNEJHTkZKRWljNDF5NExtRHU=

Ports

6565

CnC

194.59.31.27

Mutex

德lΔ杰Xe弗德伊ΙRΒΑfרam

87ee964282652e2a25407eb6e742713f (65.54 KB)
File Structure
Overlay_0f343b09.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

R2hNNVQxa2dUWXZpdXExNEJHTkZKRWljNDF5NExtRHU=

Ports

6565

Hosts

194.59.31.27

Version

Install

false

Install-Folder

%AppData%

Install File

�

Mutex

德lΔ杰Xe弗德伊ΙRΒΑfרam

Certificate

MIICKTCCAZKgAwIBAgIVAPS4iiWNYsCv6s/955uO1LraC5A9MA0GCSqGSIb3DQEBDQUAMF0xDjAMBgNVBAMMBUVCT0xBMRMwEQYDVQQLDApxd3FkYW5jaHVuMRwwGgYDVQQKDBNEY1JhdCBCeSBxd3FkYW5jaHVuMQswCQYDVQQHDAJTSDELMAkGA1UEBhMCQ04wHhcNMjQxMDI4MTEwOTM1WhcNMzUwODA3MTEwOTM1WjAQMQ4wDAYDVQQDDAVEY1JhdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAhYZTgmUSw5uQRbarBnd62FNQ1JCIpXR4pDMSCmvFmelkgCxJpZOoGuLEmvHcTwmoi8Hmzu5+hMHEf3uwQ4xpZdUQb3O3rFQ/sN0VwlnoeKI1JSxZ1BgJKnCwC4wpmgkih1MEhf+Xo7njSqjoyJz6R7KKnfeLE5YW5gM6KY3PxO0CAwEAAaMyMDAwHQYDVR0OBBYEFP+uyHIlSuDuFRB1kEAjRLvyU1klMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEAVODo/nDlbxB3WWUlkDdxiE3ORn90BYiY9hZHKNcLRJWWJS5JdzmNBaHtx9FUxxBolS1v2x4HcGxz5fdC9x2Ge2sJGzTWxyJhl/5UirYEqaXEIGXhv+qK4jDpR8ollrOYEGzxO3vqm4SizyzMaKGX5gBeuwicoOXH2BQ6

ServerSignature

E2tfUHPRrSW3fKya8bg7859yUhfkqWXaodPfl44xB9ZjhcV4NePgYH/eOBfKvbwrJ6lK2F9AEwt6Ei9idDZUvV2KTT5oMrIHocnR7cOP/6fWJ5EPNg6SH8amkwmXJKLkfa4G0VVJ6+PNYE/5z6SN7JEPW+V9zONG

Anti-VM

null

PasteBin

false

BDOS

1

Delay

Default

Group

false

Artefacts
Name
Value Location
Key (AES_256)

R2hNNVQxa2dUWXZpdXExNEJHTkZKRWljNDF5NExtRHU=

Malicious

87ee964282652e2a25407eb6e742713f

Ports

6565

Malicious

87ee964282652e2a25407eb6e742713f

CnC

194.59.31.27

Malicious

87ee964282652e2a25407eb6e742713f

Mutex

德lΔ杰Xe弗德伊ΙRΒΑfרam

Malicious

87ee964282652e2a25407eb6e742713f

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙