Suspicious
Suspect

9eeb8796a54d42c49bcabe60a8e81be3

PE Executable
|
MD5: 9eeb8796a54d42c49bcabe60a8e81be3
|
Size: 1.85 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
9eeb8796a54d42c49bcabe60a8e81be3
Sha1
e2fd8b6fb95db02defce25bba1e1731ea5e014ba
Sha256
c7cfa4eb2cce54eae7d5af7025931c424e48c3dd28dcdb76399e4ab23a4c1f6e
Sha384
b7e636b16e55e2425389f5d9558c08c08ba90598eb614d72422366cc5e74c5785802d2f8d37d27f2ec97c728dd9fd04f
Sha512
d54824a8d3c149272d227cd911eb557abe21706e451b7bdf1bf26100fb8e40e8d9cd71f8de60aa042e2f850db8f9927a66b5ae8b9f49765b8c3ed574f5b95478
SSDeep
49152:/g/1J+tbOcRmC5khMLad6eLPv6xGIuvAa0:4xc95kOad6eL36Vu4a
TLSH
3385332DD8B2195CDB65EC77B462EFD37321E9C3292DF0B45C01B0ECA14A39B569C229

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
a
Informations
Name
Value
Module Name

temploader.exe

Full Name

temploader.exe

EntryPoint

System.Void a.a::Main()

Scope Name

temploader.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

temploader

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

3

Main Method

System.Void a.a::Main()

Main IL Instruction Count

37

Main IL

call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() ldstr CQHZuz023Pvng3d2vFF6yQ== ldstr ivil/I9wnVXk0vtKV1aRSlwN137NEHVe5V4TTc70hW8= ldstr VtSInhm1Zl/pAAdgrN1RSg== call System.String ሕ天譡嬁䣏஺䔒⯉䇿᭏::㫎읈톛뮇ᣁᅿ㍬(System.String,System.String,System.String) callvirt System.IO.Stream System.Reflection.Assembly::GetManifestResourceStream(System.String) stloc.0 <null> newobj System.Void System.IO.MemoryStream::.ctor() stloc.1 <null> ldloc.0 <null> ldc.i4.0 <null> newobj System.Void System.IO.Compression.DeflateStream::.ctor(System.IO.Stream,System.IO.Compression.CompressionMode) stloc.2 <null> ldloc.2 <null> ldloc.1 <null> callvirt System.Void System.IO.Stream::CopyTo(System.IO.Stream) leave IL_0046: ldloc.1 ldloc.2 <null> brfalse IL_0045: endfinally ldloc.2 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ldloc.1 <null> callvirt System.Byte[] System.IO.MemoryStream::ToArray() call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() ldnull <null> ldnull <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave IL_0070: ret ldloc.0 <null> brfalse IL_006F: endfinally ldloc.0 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ret <null>

Module Name

temploader.exe

Full Name

temploader.exe

EntryPoint

System.Void a.a::Main()

Scope Name

temploader.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

temploader

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

3

Main Method

System.Void a.a::Main()

Main IL Instruction Count

37

Main IL

call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() ldstr CQHZuz023Pvng3d2vFF6yQ== ldstr ivil/I9wnVXk0vtKV1aRSlwN137NEHVe5V4TTc70hW8= ldstr VtSInhm1Zl/pAAdgrN1RSg== call System.String ሕ天譡嬁䣏஺䔒⯉䇿᭏::㫎읈톛뮇ᣁᅿ㍬(System.String,System.String,System.String) callvirt System.IO.Stream System.Reflection.Assembly::GetManifestResourceStream(System.String) stloc.0 <null> newobj System.Void System.IO.MemoryStream::.ctor() stloc.1 <null> ldloc.0 <null> ldc.i4.0 <null> newobj System.Void System.IO.Compression.DeflateStream::.ctor(System.IO.Stream,System.IO.Compression.CompressionMode) stloc.2 <null> ldloc.2 <null> ldloc.1 <null> callvirt System.Void System.IO.Stream::CopyTo(System.IO.Stream) leave IL_0046: ldloc.1 ldloc.2 <null> brfalse IL_0045: endfinally ldloc.2 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ldloc.1 <null> callvirt System.Byte[] System.IO.MemoryStream::ToArray() call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() ldnull <null> ldnull <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave IL_0070: ret ldloc.0 <null> brfalse IL_006F: endfinally ldloc.0 <null> callvirt System.Void System.IDisposable::Dispose() endfinally <null> ret <null>

Artefacts
Name
Value
Embedded Resources

1

Suspicious Type Names (1-2 chars)

1

9eeb8796a54d42c49bcabe60a8e81be3 (1.85 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
a
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

1

9eeb8796a54d42c49bcabe60a8e81be3

Suspicious Type Names (1-2 chars)

1

9eeb8796a54d42c49bcabe60a8e81be3

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙