Suspicious
Suspect

8d4a77e1fc1ba4ed1bd544af53500551

PE Executable
|
MD5: 8d4a77e1fc1ba4ed1bd544af53500551
|
Size: 3.4 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
8d4a77e1fc1ba4ed1bd544af53500551
Sha1
1ed585628d516661001127ed698b0eb5e8000349
Sha256
5b55a5d95f541d3d1c214926893f3187f0a90d4984e673c81c28edb23576c286
Sha384
6afb43014013b700af7634f4d8f4543ff8bae01c45c1c8091184b7c7d00b0b6523b272d145dedf32feb17ac090cecead
Sha512
888a22c8b270cc9e6c7c26d6985fa6fe5ba5cb3d9b1df9c7adf697e4d5c28cdbfff1e3e87a549aae1841b59c86197c0e6de6c81742e30f578998e24cdd604411
SSDeep
98304:FkFQ4LY7apc31fd81oCQkhyO+524hlkiOX5P:IxL4ccl2uCQZLh1O
TLSH
1DF533FC339260DFD05BC6328B661D3464822DAF1B19A25775277E9B763E1C24F214B2

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

5.3.8.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

43

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

66

Main IL

nop <null> ldc.i4 -522839975 ldc.i4 -1281661946 xor <null> dup <null> stloc.2 <null> ldc.i4.7 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_00EF: ret newobj System.Void server.pDmmQpvNxej::.ctor() stloc.0 <null> ldloc.2 <null> ldc.i4 -1866926952 mul <null> ldc.i4 -880010258 xor <null> br.s IL_0006: ldc.i4 -1281661946 ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::‮‎‎‮‌‬‪‬‏‭​‬‪‍‭​‮‏‫‭‌‏‮‪‫‫‮() call System.Diagnostics.ProcessModule server.Module2::‬‏‌‍​‭‫‪‍‍‮‎​‭‎‍‮​‪​‬‌‌‭‫​‫‎‮‮(System.Diagnostics.Process) call System.String server.Module2::‭‬​‭‏‭‮‏‍‍‌‫‪‮‮‫‬‭‬‎‏‭‮‎‎‌‮(System.Diagnostics.ProcessModule) callvirt System.Boolean server.pDmmQpvNxej::HorzCxscmzh(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1595823126 mul <null> ldc.i4 -1097089977 xor <null> br.s IL_0006: ldc.i4 -1281661946 newobj System.Void server.TMcQbPAKQtg::.ctor() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::‮‎‎‮‌‬‪‬‏‭​‬‪‍‭​‮‏‫‭‌‏‮‪‫‫‮() call System.Diagnostics.ProcessModule server.Module2::‬‏‌‍​‭‫‪‍‍‮‎​‭‎‍‮​‪​‬‌‌‭‫​‫‎‮‮(System.Diagnostics.Process) call System.String server.Module2::‭‬​‭‏‭‮‏‍‍‌‫‪‮‮‫‬‭‬‎‏‭‮‎‎‌‮(System.Diagnostics.ProcessModule) callvirt System.Boolean server.TMcQbPAKQtg::lxhdOXxZFPe(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1835419469 mul <null> ldc.i4 -1115663108 xor <null> br IL_0006: ldc.i4 -1281661946 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::GxpkPVaSHj(System.String) stsfld System.Byte[] server.Module2::Bytes ldloc.2 <null> ldc.i4 1361487296 mul <null> ldc.i4 -1112625207 xor <null> br IL_0006: ldc.i4 -1281661946 call System.String server.My.Resources.Resources::get_encrypted() ldstr HRW<KNu|†~…‡cN\€LuJ@~v@vH;AWS call System.String server.Module2::AES_Decrypt(System.String,System.String) stsfld System.String server.Module2::Hex ldloc.2 <null> ldc.i4 656049699 mul <null> ldc.i4 -1595500401 xor <null> br IL_0006: ldc.i4 -1281661946 ret <null>

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

5.3.8.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

43

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

66

Main IL

nop <null> ldc.i4 -522839975 ldc.i4 -1281661946 xor <null> dup <null> stloc.2 <null> ldc.i4.7 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_00EF: ret newobj System.Void server.pDmmQpvNxej::.ctor() stloc.0 <null> ldloc.2 <null> ldc.i4 -1866926952 mul <null> ldc.i4 -880010258 xor <null> br.s IL_0006: ldc.i4 -1281661946 ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::‮‎‎‮‌‬‪‬‏‭​‬‪‍‭​‮‏‫‭‌‏‮‪‫‫‮() call System.Diagnostics.ProcessModule server.Module2::‬‏‌‍​‭‫‪‍‍‮‎​‭‎‍‮​‪​‬‌‌‭‫​‫‎‮‮(System.Diagnostics.Process) call System.String server.Module2::‭‬​‭‏‭‮‏‍‍‌‫‪‮‮‫‬‭‬‎‏‭‮‎‎‌‮(System.Diagnostics.ProcessModule) callvirt System.Boolean server.pDmmQpvNxej::HorzCxscmzh(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1595823126 mul <null> ldc.i4 -1097089977 xor <null> br.s IL_0006: ldc.i4 -1281661946 newobj System.Void server.TMcQbPAKQtg::.ctor() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::‮‎‎‮‌‬‪‬‏‭​‬‪‍‭​‮‏‫‭‌‏‮‪‫‫‮() call System.Diagnostics.ProcessModule server.Module2::‬‏‌‍​‭‫‪‍‍‮‎​‭‎‍‮​‪​‬‌‌‭‫​‫‎‮‮(System.Diagnostics.Process) call System.String server.Module2::‭‬​‭‏‭‮‏‍‍‌‫‪‮‮‫‬‭‬‎‏‭‮‎‎‌‮(System.Diagnostics.ProcessModule) callvirt System.Boolean server.TMcQbPAKQtg::lxhdOXxZFPe(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1835419469 mul <null> ldc.i4 -1115663108 xor <null> br IL_0006: ldc.i4 -1281661946 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::GxpkPVaSHj(System.String) stsfld System.Byte[] server.Module2::Bytes ldloc.2 <null> ldc.i4 1361487296 mul <null> ldc.i4 -1112625207 xor <null> br IL_0006: ldc.i4 -1281661946 call System.String server.My.Resources.Resources::get_encrypted() ldstr HRW<KNu|†~…‡cN\€LuJ@~v@vH;AWS call System.String server.Module2::AES_Decrypt(System.String,System.String) stsfld System.String server.Module2::Hex ldloc.2 <null> ldc.i4 656049699 mul <null> ldc.i4 -1595500401 xor <null> br IL_0006: ldc.i4 -1281661946 ret <null>

8d4a77e1fc1ba4ed1bd544af53500551 (3.4 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙