Suspicious
Suspect

9092c3a68e9f5e52d4fca60f15fa0027

PE Executable
|
MD5: 9092c3a68e9f5e52d4fca60f15fa0027
|
Size: 26 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
9092c3a68e9f5e52d4fca60f15fa0027
Sha1
673c98653a8d38a071b56fb2ceea66ef5e944cb5
Sha256
b073bd6963c36cd4ea37acf1ccd75d418ac3e293a51e8accebc96a97215ddf81
Sha384
bb587c5d27e1a967f20452044538aa5fa4ace1862ccdfdfadb3c522e05c38bd12b92eb34a2aab9d5a67be197d5e214e4
Sha512
3aef71a349adf066dbaef4e8e606cdaf8dd08ad4119d8fbd756411a4a5aed723f7fc726a98b0fdabc1bdd88c637303f90fdc76e7fb2e37df2e6efed657d47b68
SSDeep
768:svpsOwvVFyRGNyKk3J/5M3PCrs1WOKDZf:QYvVFMuybRM/ksjE
TLSH
FFC2D006EB5A87E3D95F0BF687970111A170D052359B0C2E66F80BE5EC82BBD5867F42

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Overlay_48e08406.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_48e08406.bin (19855 bytes)

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Int32 mpress._::Main(System.String[])

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Int32 mpress._::Main(System.String[])

Main IL Instruction Count

75

Main IL

nop <null> call System.String System.Windows.Forms.Application::get_ExecutablePath() ldloca.s V_0 call System.Boolean mpress._::lf(System.String,System.Byte[]&) stloc.s V_6 ldloc.s V_6 brtrue.s IL_0029: nop nop <null> ldstr File is invalid. ldstr MPRESS call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldc.i4.m1 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 nop <null> ldloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stsfld System.Reflection.Assembly mpress._::mp ldsfld System.Reflection.Assembly mpress._::mp callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.1 <null> ldnull <null> stloc.3 <null> ldloc.1 <null> callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> ldc.i4.0 <null> cgt <null> ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0066: ldloc.1 ldc.i4.1 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_7 stloc.3 <null> ldloc.1 <null> ldnull <null> ldloc.3 <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_4 ldloc.s V_4 ldnull <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0085: ldc.i4.0 ldloc.s V_4 unbox.any System.Int32 stloc.2 <null> br.s IL_0087: nop ldc.i4.0 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop pop <null> nop <null> ldc.i4.m1 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop nop <null> ldloc.2 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 ldloc.s V_5 ret <null>

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Int32 mpress._::Main(System.String[])

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Int32 mpress._::Main(System.String[])

Main IL Instruction Count

75

Main IL

nop <null> call System.String System.Windows.Forms.Application::get_ExecutablePath() ldloca.s V_0 call System.Boolean mpress._::lf(System.String,System.Byte[]&) stloc.s V_6 ldloc.s V_6 brtrue.s IL_0029: nop nop <null> ldstr File is invalid. ldstr MPRESS call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldc.i4.m1 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 nop <null> ldloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stsfld System.Reflection.Assembly mpress._::mp ldsfld System.Reflection.Assembly mpress._::mp callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.1 <null> ldnull <null> stloc.3 <null> ldloc.1 <null> callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> ldc.i4.0 <null> cgt <null> ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0066: ldloc.1 ldc.i4.1 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_7 stloc.3 <null> ldloc.1 <null> ldnull <null> ldloc.3 <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_4 ldloc.s V_4 ldnull <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0085: ldc.i4.0 ldloc.s V_4 unbox.any System.Int32 stloc.2 <null> br.s IL_0087: nop ldc.i4.0 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop pop <null> nop <null> ldc.i4.m1 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop nop <null> ldloc.2 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 ldloc.s V_5 ret <null>

9092c3a68e9f5e52d4fca60f15fa0027 (26 KB)
File Structure
Overlay_48e08406.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙