954592a840bed61ea6173fa147262760
PE Executable | MD5: 954592a840bed61ea6173fa147262760 | Size: 376.84 KB | application/x-dosexec
Symbol Obfuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 954592a840bed61ea6173fa147262760
|
| Sha1 | 285d074bffae8b6e9b898681f3bdd689c49627fb
|
| Sha256 | 90ceb85e5df35233e231eaf51600a50722d627c8ba713519cff6fc7b7414bb2f
|
| Sha384 | 7a9404bfcdac73217a7f41a46bd09911fab4410a5edd377647704616f00428bca2837f42c7285952fcd557dbc1993aa4
|
| Sha512 | bd447c7ef8da21258fecc64e829937c8dc36192be574c5a761978757433a94af3c10aa1de997883ec270392784d51741e17fd5302109c31771c7326c415c5d83
|
| SSDeep | 6144:6fqQ4i1FFiEKAwpbYCGz7nLz06bx4owfah8TblNMt31CYK:kpliVbYpn8C4owfaSdNMt31CYK
|
| TLSH | D0849C1333A8D93BD1FE173AF4360A184BB1D457B616F38B5A5A55B82D233868D903B3
|
PeID
|
Config. Field0 | Value |
|---|---|
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Port | 34. |
| Host | 34. |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Version | 1.3.0.0 |
| Port | 434 |
| Host | windows10-11.duckdns.org |
| ReconnectDelay | 2999 |
| Key | oXCnUiPgBL0sy3Tlv+F8LQ== |
| AuthKey | h36LUNE6D6Y9hpohEF6YNS5bniF/Glgol+St+nwGv2QBfXWLmUsLx5aanXm2PRFz2aY54a//jMvBGR9l4hF9Vg== |
| SubDirectory | up |
| InstallName | jstat.exe |
| Install | 0 |
| Startup | 0 |
| Mutex | QSR_MUTEX_wizqga |
| StartupKey | Windows Protecte |
| HideFile | 1 |
| EnableLogger | 1 |
| Tag | Kanjal |
| LogDirectory | ogl |
| HideLogDirectory | 0 |
| HideLogSubdirectory | 1 |
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader FAIL, AsmResolver Mapped OK |
| Info | Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_3558d2f3.exe |
| Module Name | Client.exe |
| Full Name | Client.exe |
| EntryPoint | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Scope Name | Client.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Client |
| Assembly Version | 1.3.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.0,Profile=Client |
| Total Strings | 896 |
| Main Method | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Main IL Instruction Count | 19 |
| Main IL | call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null> |
| Module Name | Client.exe |
| Full Name | Client.exe |
| EntryPoint | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Scope Name | Client.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Client |
| Assembly Version | 1.3.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.0,Profile=Client |
| Total Strings | 896 |
| Main Method | System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[]) |
| Main IL Instruction Count | 19 |
| Main IL | call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null> |
|
Name0 | Value |
|---|---|
| CnC | windows10-11.duckdns.org |
| Port | 434 |
| CnC | 34. |
| Port | 34. |
| PE Layout | MemoryMapped (process dump suspected) |
| CnC | windows10-11.duckdns.org |
| Port | 434 |
| CnC | 34. |
| Port | 34. |
| PE Layout | MemoryMapped (process dump suspected) |
|
Config. Field0 | Value |
|---|---|
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Port | 34. |
| Host | 34. |
| Conf. AES-Key | BO3REHj6wQEl6olanjuI |
| Version | 1.3.0.0 |
| Port | 434 |
| Host | windows10-11.duckdns.org |
| ReconnectDelay | 2999 |
| Key | oXCnUiPgBL0sy3Tlv+F8LQ== |
| AuthKey | h36LUNE6D6Y9hpohEF6YNS5bniF/Glgol+St+nwGv2QBfXWLmUsLx5aanXm2PRFz2aY54a//jMvBGR9l4hF9Vg== |
| SubDirectory | up |
| InstallName | jstat.exe |
| Install | 0 |
| Startup | 0 |
| Mutex | QSR_MUTEX_wizqga |
| StartupKey | Windows Protecte |
| HideFile | 1 |
| EnableLogger | 1 |
| Tag | Kanjal |
| LogDirectory | ogl |
| HideLogDirectory | 0 |
| HideLogSubdirectory | 1 |
|
Name0 | Value | Location |
|---|---|---|
| CnC | windows10-11.duckdns.org Malicious |
954592a840bed61ea6173fa147262760 |
| Port | 434 Malicious |
954592a840bed61ea6173fa147262760 |
| CnC | 34. Malicious |
954592a840bed61ea6173fa147262760 |
| Port | 34. Malicious |
954592a840bed61ea6173fa147262760 |
| PE Layout | MemoryMapped (process dump suspected) |
954592a840bed61ea6173fa147262760 |
| CnC | windows10-11.duckdns.org Malicious |
954592a840bed61ea6173fa147262760 > [Rebuild from dump]_3558d2f3.exe |
| Port | 434 Malicious |
954592a840bed61ea6173fa147262760 > [Rebuild from dump]_3558d2f3.exe |
| CnC | 34. Malicious |
954592a840bed61ea6173fa147262760 > [Rebuild from dump]_3558d2f3.exe |
| Port | 34. Malicious |
954592a840bed61ea6173fa147262760 > [Rebuild from dump]_3558d2f3.exe |
| PE Layout | MemoryMapped (process dump suspected) |
954592a840bed61ea6173fa147262760 > [Rebuild from dump]_3558d2f3.exe |