Suspicious
Suspect

8b1559c9e441e9a6944074cbc450f3ec

PE Executable
|
MD5: 8b1559c9e441e9a6944074cbc450f3ec
|
Size: 800.26 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
8b1559c9e441e9a6944074cbc450f3ec
Sha1
d6dffa591345e3e1fb4806a676f07a31721942d2
Sha256
a3721fdc1d4f9179cec068cac23a723fdf2bba91ab354811266d90defbcffc1f
Sha384
28fc1202ef152084e7b4653cf359a329f0760910a53a202b82a4ea3c8375dc2b0ab3767cc5d9d5a94e6735ffbb499e6d
Sha512
96385cbcf0060cdd9c58d90e31a83418058054a5b5721148cb7c598785335229e71f2ce7a997574470523f6ecdd320e95cfb283032100c2ba73c21b4bd75aa15
SSDeep
12288:l6FAkO9AFtK1fR0OWgzUpIJURj7oYbCr9Qv4QsHmZrCbEixnewakD5Uj3:7kQCtKPhEpIWRj0vrbQa170wamuj
TLSH
870501637506F922CCA063B95668E3B9123D5E88E423C38745F9BE7B3D427932DD49C2

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
clientapp.Form1.resources
$this.Icon
[NBF]root.IconData
nsh
[NBF]root.Data
clientapp.FormConf.resources
clientapp.Properties.Resources.resources
AAnj
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

arjN.exe

Full Name

arjN.exe

EntryPoint

System.Void clientapp.Program::Main()

Scope Name

arjN.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

arjN

Assembly Version

2.1.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

115

Main Method

System.Void clientapp.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void clientapp.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

arjN.exe

Full Name

arjN.exe

EntryPoint

System.Void clientapp.Program::Main()

Scope Name

arjN.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

arjN

Assembly Version

2.1.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

115

Main Method

System.Void clientapp.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void clientapp.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\JptnvLfmNb\src\obj\Debug\arjN.pdb

Embedded Resources

4

Suspicious Type Names (1-2 chars)

0

8b1559c9e441e9a6944074cbc450f3ec (800.26 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
clientapp.Form1.resources
$this.Icon
[NBF]root.IconData
nsh
[NBF]root.Data
clientapp.FormConf.resources
clientapp.Properties.Resources.resources
AAnj
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\JptnvLfmNb\src\obj\Debug\arjN.pdb

8b1559c9e441e9a6944074cbc450f3ec

Embedded Resources

4

8b1559c9e441e9a6944074cbc450f3ec

Suspicious Type Names (1-2 chars)

0

8b1559c9e441e9a6944074cbc450f3ec

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙