Malicious
Malicious

a34cddcd4c77abc914b629c864d1be69

PE Executable
|
MD5: a34cddcd4c77abc914b629c864d1be69
|
Size: 1.59 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
a34cddcd4c77abc914b629c864d1be69
Sha1
920a45796c9abd80ec46c6c1b4e1f43d3c4edd26
Sha256
29a955752a6b382e17a74244825f66d1cba8776f1c47ae908b1e9c9fc88a513d
Sha384
09ad9aad89fb3fcc171f3355bb655516413ac0d05066400ddc6275f3753a578d4b54dff7c32664352a45163311c1cb98
Sha512
89b097e885fb7c06d44abebe2d493e4862cca28bc3ffeb32179c7245fd1e8957699f340e5d9c4bbbe9ee5d590d3d508c6e7f9c48344e4d61a08ac8b7c946ac83
SSDeep
24576:YTQT+hDw6VB8Q3yIi3KIX58G1qaPAVy1nDPE9bEmxgJRRhh53t:YTQgwfQCLZX5d1sV2DMEmaFj53
TLSH
F7758C027E448E21F1195633C2EF455887B8985166E6E32B7DBB336E19523E73C0DACB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

Module Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Full Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

EntryPoint

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Scope Name

sWXSXXVoWCVwnrWL7M8q46CY3O8R3wljgR

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

BGc1SUmDhzdMd9GMM9RzvT9ZJYDvjavPWtUFfUqWR2f

Assembly Version

5.4.0.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

63

Main Method

System.Void uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::A2MkqbCsGI()

Main IL Instruction Count

14

Main IL

br.s IL_000B: ldc.i4.0 call <null> ldnull <null> ldc.i4.0 <null> ldelem.ref <null> pop <null> ldc.i4.0 <null> brtrue.s IL_0007: ldnull call System.Void yYiov3kRDd48YZsoSCm.oBDAgnkpZ7h7C1P1Uqw::kLjw4iIsCLsZtxc4lksN0j() nop <null> ldsfld System.Object uGu3a82wYEZVLanqcnP.OiZ4a72deWg7oWQc6ov::DYSk4tml3Z callvirt System.Void t5YQuF2pyMlt3wmyLEE.WDO9R82EJeCvoZKaWve::HiCmnjpJ6u() nop <null> ret <null>

a34cddcd4c77abc914b629c864d1be69 (1.59 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.sdata
.rsrc
.reloc
Resources
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
.Net Resources
rakE3Mh1cfbHbeadCB.ELfjXydAZtNR2J5NVV
yOgdvKYYPjVjLaWo6d.P6NruENDNI2NpyKh5v
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙