Suspicious
Suspect

8e225ab39b109774e81c348f22b487be

PE Executable
|
MD5: 8e225ab39b109774e81c348f22b487be
|
Size: 466.43 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

High

Hash
Hash Value
MD5
8e225ab39b109774e81c348f22b487be
Sha1
ab8615ac6b7b1becfcd04c7395e6beef09c63f77
Sha256
ebe3a3b29bac94e70fca9456c8607a0b004cc36361c52e24b5c1981cf8f8dbf3
Sha384
1d7f2bbc1f4e3a1b394d30b997c50951f7523474395534cbc789fc36239b3cc633303af320584eea0a207f9035598d0b
Sha512
146ff065c6ef022b7d0918983396e9a36bc45c339882dfc7191240611fd615ac0f42440bc91d5bc61ca6f6b00b925cae3a672206eb04b3852cd28ee502a9691b
SSDeep
12288:RnFbTuFaK4OSj/ar1JVO+t31U8hs5RDbSQFEh:hqSj/arBO+EQsrbSdh
TLSH
46A4BE56D992CD52DE552FB5C23289341073BD7826F2E24FE8C979B627F33E1041A88B

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

1.8.7.9

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

32

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

62

Main IL

nop <null> call System.String server.Module2::_C75B63FB2C7A4D53_() ldc.i4 -1039863504 br.s IL_000D: call System.String <Module>::_B81E1A0B94E74867_<System.String>(System.IntPtr) call System.String <Module>::_B81E1A0B94E74867_<System.String>(System.IntPtr) call System.String server.Module2::_FE2B87018EDA40D1_(System.String,System.String) stsfld System.String server.Module2::Hex ldc.i4 156148936 stloc.3 <null> ldloc.3 <null> ldc.i4 845479469 mul <null> ldc.i4 -57619947 mul <null> ldc.i4 2125985703 sub <null> ldc.i4 414491524 add <null> dup <null> stloc.2 <null> ldc.i4.4 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_0091: ldloc.0 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::_CD1D01520AE34CDE_(System.String) stsfld System.Byte[] server.Module2::Bytes ldc.i4 1375002261 stloc.s V_4 ldloc.2 <null> ldc.i4 -749377 mul <null> ldloc.s V_4 xor <null> br.s IL_0021: stloc.3 call System.Object server.Module2::_57AE8A12A7064059_() stloc.0 <null> ldc.i4 -976789794 stloc.s V_5 ldloc.2 <null> ldc.i4 -165891 mul <null> ldloc.s V_5 xor <null> br.s IL_0021: stloc.3 ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_01E82990B64A43BD_() call System.Object server.Module2::_9EA803FEB4A145C1_(System.Object) call System.String server.Module2::_5E96A191C4484174_(System.Object) call System.Boolean server.Module2::_006FBE5DEDF2483A_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_64F1513653864685_() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_01E82990B64A43BD_() call System.Object server.Module2::_9EA803FEB4A145C1_(System.Object) call System.String server.Module2::_5E96A191C4484174_(System.Object) call System.Boolean server.Module2::_88F12BF914EB4178_(System.Object,System.Byte[],System.String) pop <null> ret <null>

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

1.8.7.9

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

32

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

62

Main IL

nop <null> call System.String server.Module2::_C75B63FB2C7A4D53_() ldc.i4 -1039863504 br.s IL_000D: call System.String <Module>::_B81E1A0B94E74867_<System.String>(System.IntPtr) call System.String <Module>::_B81E1A0B94E74867_<System.String>(System.IntPtr) call System.String server.Module2::_FE2B87018EDA40D1_(System.String,System.String) stsfld System.String server.Module2::Hex ldc.i4 156148936 stloc.3 <null> ldloc.3 <null> ldc.i4 845479469 mul <null> ldc.i4 -57619947 mul <null> ldc.i4 2125985703 sub <null> ldc.i4 414491524 add <null> dup <null> stloc.2 <null> ldc.i4.4 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_0091: ldloc.0 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::_CD1D01520AE34CDE_(System.String) stsfld System.Byte[] server.Module2::Bytes ldc.i4 1375002261 stloc.s V_4 ldloc.2 <null> ldc.i4 -749377 mul <null> ldloc.s V_4 xor <null> br.s IL_0021: stloc.3 call System.Object server.Module2::_57AE8A12A7064059_() stloc.0 <null> ldc.i4 -976789794 stloc.s V_5 ldloc.2 <null> ldc.i4 -165891 mul <null> ldloc.s V_5 xor <null> br.s IL_0021: stloc.3 ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_01E82990B64A43BD_() call System.Object server.Module2::_9EA803FEB4A145C1_(System.Object) call System.String server.Module2::_5E96A191C4484174_(System.Object) call System.Boolean server.Module2::_006FBE5DEDF2483A_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_64F1513653864685_() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_01E82990B64A43BD_() call System.Object server.Module2::_9EA803FEB4A145C1_(System.Object) call System.String server.Module2::_5E96A191C4484174_(System.Object) call System.Boolean server.Module2::_88F12BF914EB4178_(System.Object,System.Byte[],System.String) pop <null> ret <null>

8e225ab39b109774e81c348f22b487be (466.43 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙