Malicious
Malicious

9f31ba00275ff6991efbb0b8d937e425

PE Executable
|
MD5: 9f31ba00275ff6991efbb0b8d937e425
|
Size: 66.05 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
9f31ba00275ff6991efbb0b8d937e425
Sha1
f3f6f814ebad786754cc223878b93d92edbad1e0
Sha256
1f4f284a2cbfa5d513a428911279e239fe33e7fcd14b8cac5bb724e550459565
Sha384
81afe9af007b8c6b37fdc33970a881ec83814421b9bcc5cae1bf92e6b24e5e1d3d40f922237130b72b36bda33ced51d4
Sha512
8f9276402b710b0c543119043c27f5ffcbc5558f292a0e86d118768305d587244dc89c3439cae568ffd4451c046c13d3173f3d2030b99f416566d059b9ad7b14
SSDeep
768:aAcEOq3U87iPL14i69JSpVDDKR5iWMT+2a1+2SCv7mqb2nNpwH1oWNmyRp8G7MVS:a23U8UkkvK4+3UGbbgwTcygG7MVclN
TLSH
B1534A002798C965E2ED4AB4BDB2950006B5D9772112DA4E7CC814DF6BAFFC649123FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

MGQyVWVTRXh2UnFobHRmV3NkOVVoc3k0aVl6dHZNbVY=

Pastebin

-

Certificate

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

ServerSignature

i3Dy85JQFWQbn43EqnPuos7RXdE3PAOwpt64ely7Au4phkeWsk9fJr6TuCq7/LXZw+MC3gQVU579uRMYbg/cpTvjgTMxONbteumFMBWRThTzR+RjQCNmzkMbjiCl2VnVVkON0V7O9ag+PULtvWMGj753n4PbWhd0

Install

true

BDOS

false

Anti-VM

false

Install File

SummitEndpointProtector.exe

Install-Folder

%AppData%

Ports

80,443,2053,2083,8080,8848,8888

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

SummitEndpointProtector.exe

Full Name

SummitEndpointProtector.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

SummitEndpointProtector.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

SummitEndpointProtector

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

SummitEndpointProtector.exe

Full Name

SummitEndpointProtector.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

SummitEndpointProtector.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

SummitEndpointProtector

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

MGQyVWVTRXh2UnFobHRmV3NkOVVoc3k0aVl6dHZNbVY=

Ports

80

Ports

443

Ports

2053

Ports

2083

Ports

8080

Ports

8848

Ports

8888

Mutex

DcRatMutex_qwqda

9f31ba00275ff6991efbb0b8d937e425 (66.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

MGQyVWVTRXh2UnFobHRmV3NkOVVoc3k0aVl6dHZNbVY=

Pastebin

-

Certificate

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

ServerSignature

i3Dy85JQFWQbn43EqnPuos7RXdE3PAOwpt64ely7Au4phkeWsk9fJr6TuCq7/LXZw+MC3gQVU579uRMYbg/cpTvjgTMxONbteumFMBWRThTzR+RjQCNmzkMbjiCl2VnVVkON0V7O9ag+PULtvWMGj753n4PbWhd0

Install

true

BDOS

false

Anti-VM

false

Install File

SummitEndpointProtector.exe

Install-Folder

%AppData%

Ports

80,443,2053,2083,8080,8848,8888

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

MGQyVWVTRXh2UnFobHRmV3NkOVVoc3k0aVl6dHZNbVY=

Malicious

9f31ba00275ff6991efbb0b8d937e425

Ports

80

Malicious

9f31ba00275ff6991efbb0b8d937e425

Ports

443

Malicious

9f31ba00275ff6991efbb0b8d937e425

Ports

2053

Malicious

9f31ba00275ff6991efbb0b8d937e425

Ports

2083

Malicious

9f31ba00275ff6991efbb0b8d937e425

Ports

8080

Malicious

9f31ba00275ff6991efbb0b8d937e425

Ports

8848

Malicious

9f31ba00275ff6991efbb0b8d937e425

Ports

8888

Malicious

9f31ba00275ff6991efbb0b8d937e425

Mutex

DcRatMutex_qwqda

Malicious

9f31ba00275ff6991efbb0b8d937e425

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙