Malicious
Malicious

93548d0c95baf74c104a6338ea615deb

PE Executable
|
MD5: 93548d0c95baf74c104a6338ea615deb
|
Size: 65.54 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
93548d0c95baf74c104a6338ea615deb
Sha1
97c20a3542704b6601492c61f4677d3d67abcb23
Sha256
d0609ecac184940c000201c8af3cdf5f4b6bdc6fbab9b5c33ed91495323c9982
Sha384
788d2a5321cce816f6a78c8ca7337ceba024b5851f46ab8215e67e3527ece09156705e46f57406c1f0f17627a146c1c8
Sha512
a8ea5bd074bc2ea775d760312813de1641bf982d0033a9c4f92792f3142873e01ec4396f270dc5280876de17001f26b9e5d4b0babaa1ac848590569dd78571ef
SSDeep
1536:TThq619kneNUUX5yh94Gbb0wdLfu6GKrVclN:Tg619kneNUUX5yoGbb0QTushY
TLSH
12535C002798C925E2AD8AB8BDB2950146B5D5732102DA5EBCC414DB6B9FFC60A137FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

RHFKM3lDbUs1QU1naG1leUVrV1RXc0V5RElnU3hNVHY=

Pastebin

-

Certificate

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

ServerSignature

Ey1gLQHbEW048aUQH1VAohiV2Wdf2OKUvO3jcUniFUgO5y0yfaGNJYIFeaC8KIzrbmlPI294cauWBZIgU6jPlP3vf8JoVPh2dQUBUSQDBMbx7rYnIb3Apx7Sag878BsmgRpNECOCaNJHnQZoGxqS6hjNv8pbj0dh

Install

true

BDOS

false

Anti-VM

true

Install File

chrome_updater.exe

Install-Folder

%AppData%

Hosts

markhancock.co.u

Ports

53,137,443,853,1337,1604,2052,2053,3389,3390,5000,6606,8080,8443,8444,8848,9001

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

chrome_updater.exe

Full Name

chrome_updater.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

chrome_updater.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

chrome_updater

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

chrome_updater.exe

Full Name

chrome_updater.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

chrome_updater.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

chrome_updater

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

RHFKM3lDbUs1QU1naG1leUVrV1RXc0V5RElnU3hNVHY=

CnC

markhancock.co.u

Ports

53

Ports

137

Ports

443

Ports

853

Ports

1337

Ports

1604

Ports

2052

Ports

2053

Ports

3389

Ports

3390

Ports

5000

Ports

6606

Ports

8080

Ports

8443

Ports

8444

Ports

8848

Ports

9001

Mutex

DcRatMutex_qwqda

93548d0c95baf74c104a6338ea615deb (65.54 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

RHFKM3lDbUs1QU1naG1leUVrV1RXc0V5RElnU3hNVHY=

Pastebin

-

Certificate

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

ServerSignature

Ey1gLQHbEW048aUQH1VAohiV2Wdf2OKUvO3jcUniFUgO5y0yfaGNJYIFeaC8KIzrbmlPI294cauWBZIgU6jPlP3vf8JoVPh2dQUBUSQDBMbx7rYnIb3Apx7Sag878BsmgRpNECOCaNJHnQZoGxqS6hjNv8pbj0dh

Install

true

BDOS

false

Anti-VM

true

Install File

chrome_updater.exe

Install-Folder

%AppData%

Hosts

markhancock.co.u

Ports

53,137,443,853,1337,1604,2052,2053,3389,3390,5000,6606,8080,8443,8444,8848,9001

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

RHFKM3lDbUs1QU1naG1leUVrV1RXc0V5RElnU3hNVHY=

Malicious

93548d0c95baf74c104a6338ea615deb

CnC

markhancock.co.u

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

53

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

137

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

443

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

853

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

1337

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

1604

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

2052

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

2053

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

3389

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

3390

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

5000

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

6606

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

8080

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

8443

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

8444

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

8848

Malicious

93548d0c95baf74c104a6338ea615deb

Ports

9001

Malicious

93548d0c95baf74c104a6338ea615deb

Mutex

DcRatMutex_qwqda

Malicious

93548d0c95baf74c104a6338ea615deb

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙