Suspicious
Suspect

9ef3ad60dc53110a64bbcad24b88266c

PE Executable
|
MD5: 9ef3ad60dc53110a64bbcad24b88266c
|
Size: 340.99 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
9ef3ad60dc53110a64bbcad24b88266c
Sha1
f68da020db677aa6a5fd085a0ad0af3697d92800
Sha256
8e8b30b90b73ff1776e14f4dd0750417fd50fb54664023cfeea22457b3594934
Sha384
e8ef9b5625e5f0f2f89d4a7868365c320e80c73856c203956262aecc0c3e66de12ca8845dc4c08142760a94723678e9e
Sha512
f71d781706ef47c2d779d434e9427123805283f144298b1f57de967e5c63e7d96c6ce36dc73100fc63db3cfee20eda2596047380bba6060383841e71387ef0eb
SSDeep
6144:6E3RuAVNFWMWQTWhlVZFhyF/k+BhTYY+ZCYdzSNRXkvySPju9AXbFlMjUWUz6/wK:jhuA7FWMeZO4FymlMjjwl7Hs
TLSH
417484257FA58E10D584247ECA7E2A09CB12E0F125027343374AF7A25D469EEDE2D3DB
File Structure
.Net Resources
ktisr6mzfey4yb
Informations
Name
Value
Info

PE Detect: PeReader FAIL, AsmResolver Mapped OK

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

<<<NULL>>>

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

506

Main Method

<<<NULL>>>

Main IL Instruction Count

167

Main IL

call <<<NULL>>> stloc <null> br IL_003F: br IL_000E nop <null> ldloc <null> call <<<NULL>>> ceq <null> brfalse IL_0029: nop nop <null> call <<<NULL>>> stloc <null> nop <null> ldloc <null> call <<<NULL>>> ceq <null> brfalse IL_003F: br IL_000E br IL_0044: call <<<NULL>>> br IL_000E: nop call <<<NULL>>> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::uirTosNgIRDrAixCFdaTZ call <<<NULL>>> call <<<NULL>>> call brfalse IL_006C: ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::sZbpogcpZYp call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::sZbpogcpZYp call <<<NULL>>> brtrue IL_0080: call <<<NULL>>> leave IL_0283: ret call <<<NULL>>> call <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::kuiumdzJisETnrATbiRCw brtrue IL_026E: call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::FpUdvgmOdzqTdsgYMEfDHkOOg call <<<NULL>>> newarr System.Char dup <null> call <<<NULL>>> call <<<NULL>>> stelem.i2 <null> callvirt stloc <null> ldloc <null> ldsfld <<<NULL>>> DTILCspthQfT.uiVUMVxFvqO::uiokaXjycHdPxNIMnoa ldloc <null> ldlen <null> conv.i4 <null> callvirt ldelem System.String call <<<NULL>>> newarr System.Char dup <null> call <<<NULL>>> call <<<NULL>>> stelem.i2 <null> callvirt stloc <null> ldloc <null> call <<<NULL>>> ldelem System.String call <<<NULL>>> newarr System.Char dup <null> call <<<NULL>>> call <<<NULL>>> stelem.i2 <null> callvirt stloc <null> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj callvirt <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldloc <null> call <<<NULL>>> ldelem System.String ldloc <null> ldsfld <<<NULL>>> DTILCspthQfT.uiVUMVxFvqO::uiokaXjycHdPxNIMnoa ldloc <null> ldlen <null> conv.i4 <null> callvirt ldelem System.String callvirt <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::kuiumdzJisETnrATbiRCw brfalse IL_026E: call <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj newobj <<<NULL>>> stfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::KrqYykxajL ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj newobj <<<NULL>>> stfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::vEPhDBpsRtnIJmPUe ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj call <<<NULL>>> newarr System.Object dup <null> call <<<NULL>>> call <<<NULL>>> call <<<NULL>>> stelem.ref <null> dup <null> call <<<NULL>>> call <<<NULL>>> stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::dBwPOFigOomGMGbRwimqaELMU stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::NajaDHsjaDlwq stelem.ref <null> dup <null> call <<<NULL>>> call call <<<NULL>>> call <<<NULL>>> call call stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::XAuwkfenJyfIGHoL stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::LLNkWfkyibI stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::bSRqZMqjiImzJFedoSiAK stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::HXyOWlnChFJhRIjTDnm stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::NFfjAUKxCEVBigOShv stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::OPrVaFxvDkRNkkkxesm stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::TtDsneFFttvdtgbCVwTWQ stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::nXLOsDbeUMrgppQKAIGH stelem.ref <null> dup <null> call <<<NULL>>> call <<<NULL>>> stelem.ref <null> call <<<NULL>>> callvirt <<<NULL>>> call <<<NULL>>> call br IL_008A: ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj pop <null> leave IL_0283: ret ret <null>

Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

9ef3ad60dc53110a64bbcad24b88266c (340.99 KB)
File Structure
.Net Resources
ktisr6mzfey4yb
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PE Layout

MemoryMapped (process dump suspected)

9ef3ad60dc53110a64bbcad24b88266c

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙