Suspicious
Suspect

999beb40a06a2641c2232c34d13260c1

PE Executable
|
MD5: 999beb40a06a2641c2232c34d13260c1
|
Size: 235.01 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
999beb40a06a2641c2232c34d13260c1
Sha1
b2d81dceca84c992d871ac8789a32ed6ba8e1e8a
Sha256
c5c12f3ffe00a9ad56f232f1f36ace01dc8e983f18f0c8a1b5d05b56ff5e3d67
Sha384
56bafd3b3a871749316947db2cc6c0b94a2d023d0df158b5aa1107771e1c1bf1f5a4d8ea909e2ffe242b6476dbb8ff67
Sha512
832173560166f19ada02c297e3ddf0e280dee5fddfc7b5f59e6a745d54e7a54d0369a3edac68055e1ecc1bc94461f15dbcd4fab4ea3394e1db8e721cd9aabfcc
SSDeep
6144:9loZMHrIkd8g+EtXHkv/iD4qpLDJ6idnIJbGmTKDovAcYL8e1m9ui:foZIL+EP8qpLDJ6idnIJbGmTAncD
TLSH
22346D5533B88B26E25F8BBDD5B1158F8771F103E90AF7CE0C4895F82812B42E949E57

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ?

Module Name

Umbral.payload.exe

Full Name

Umbral.payload.exe

EntryPoint

System.Void 毋䣆㔏㖴愐䲦䂷ࢄ恡杯焍䃑욳쐉錱瞆ﶞ⮖庾::⍀氣⚋嵈뇎ࢃﱈ骎ঞ뗑嚛ꘗﳍ눍깔凎Ꜩ(System.String[])

Scope Name

Umbral.payload.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Umbral.payload

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

964

Main Method

System.Void 毋䣆㔏㖴愐䲦䂷ࢄ恡杯焍䃑욳쐉錱瞆ﶞ⮖庾::⍀氣⚋嵈뇎ࢃﱈ骎ঞ뗑嚛ꘗﳍ눍깔凎Ꜩ(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task 毋䣆㔏㖴愐䲦䂷ࢄ恡杯焍䃑욳쐉錱瞆ﶞ⮖庾::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

Module Name

Umbral.payload.exe

Full Name

Umbral.payload.exe

EntryPoint

System.Void 毋䣆㔏㖴愐䲦䂷ࢄ恡杯焍䃑욳쐉錱瞆ﶞ⮖庾::⍀氣⚋嵈뇎ࢃﱈ骎ঞ뗑嚛ꘗﳍ눍깔凎Ꜩ(System.String[])

Scope Name

Umbral.payload.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Umbral.payload

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

964

Main Method

System.Void 毋䣆㔏㖴愐䲦䂷ࢄ恡杯焍䃑욳쐉錱瞆ﶞ⮖庾::⍀氣⚋嵈뇎ࢃﱈ骎ঞ뗑嚛ꘗﳍ눍깔凎Ꜩ(System.String[])

Main IL Instruction Count

7

Main IL

ldarg.0 <null> call System.Threading.Tasks.Task 毋䣆㔏㖴愐䲦䂷ࢄ恡杯焍䃑욳쐉錱瞆ﶞ⮖庾::Main(System.String[]) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.0 <null> ldloca.s V_0 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ret <null>

999beb40a06a2641c2232c34d13260c1 (235.01 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙