Malicious
Malicious

a48b850b6c45e196beb6c6eaf6e14eff

PE Executable
|
MD5: a48b850b6c45e196beb6c6eaf6e14eff
|
Size: 64.51 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
a48b850b6c45e196beb6c6eaf6e14eff
Sha1
1d261cafc45352a6fa08a598080e92f0a1ec4832
Sha256
5fff8aaa7eda49e0c339f8a415f158d840f22344849f294fde8cbbd2fa00b8f3
Sha384
781119ecbe592e18e2a8332b784e735b8e0844f91e542e80b3fb00188178e67a94f557d2e87faac25db9fb284e7a1691
Sha512
c226967b2edaff372885322f8de0ca8d4d32f3f28d50b767d8c7939580e958bda4ae4073511462e732a2f07a348c81eb422359266c152030da5ec061a91670dc
SSDeep
1536:AhjExLDRwQuNMXbmaeWs1lY6ump2zGbbTwSqmVfGtZVclN:AhjExLDRwQuNMXbreFlWmpUGbbT7GzY
TLSH
7C534A003798CA65E1ED4AF8ACF2950146B1D5372206DB5E7CC814DB9B9FFC64A132EE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

VmJhWlBoN3JGN0luTGJrd0luanNlWXVtdExmWW1kOU0=

Pastebin

-

Certificate

MIICLjCCAZegAwIBAgIVAL9MTRrmIZoaxuTj0zfqoFglzYQXMA0GCSqGSIb3DQEBDQUAMGIxEzARBgNVBAMMCm5pb3hzYW50ZXoxEzARBgNVBAsMCnF3cWRhbmNodW4xHDAaBgNVBAoME0RjUmF0IEJ5IHF3cWRhbmNodW4xCzAJBgNVBAcMAlNIMQswCQYDVQQGEwJDTjAeFw0yNTAxMDMyMTE2MTZaFw0zNTEwMTMyMTE2MTZaMBAxDjAMBgNVBAMMBURjUmF0MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCrhuZ/W3/3OUC7QiXRS+Iw2LKdS2Y6kCrBvV0b9N1w9MxIN7UOG6Y5VYeGJAmiTEU5CHdn0CN7GhRMJorLU9AjF5lz2LQzVxLnP4/mzCCQty1LY6FzqNbqSWbnV2qiAcRemm1MNGVtoIIa8Oruix4Cz+WWjvteEi7gPAkfk6ezjQIDAQABozIwMDAdBgNVHQ4EFgQUFKY2hI5U1f77b88pafoRX7hjb90wDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOBgQAR0wfsFlikVfjsUl+/UNi6wlX+VBK/+1K3f1UvklYTmUg6/EsfuVMDWC+aDCRgsRc8F4ZDgBdjI6KSGhGw8bsHBfrY6d7TViIMwa78uyoWCnKXa7/aUqDS1YGPTRcB6AQ66qpOYLNPJ7tR5mUMRwRKOZ46ycT+cU3sVZFm2B+/HQ==

ServerSignature

Mh8Jg6saaO+HOa7r/osJ8FarYL9OkXjCS5G7iuMms+Jxz6nF0S/5naK1Txw339v9WqX0lYrevUybOdKwVeaGjvdc+pApw3wvMFtO7oLUD4lILhTz8+xGtiSOedTIadaE7AVJkzvENOYgW1VfWyZ2IAu1upcpkgSr

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Hosts

48.209.82.191

Ports

1337

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

ns.exe

Full Name

ns.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

ns.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

ns

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

ns.exe

Full Name

ns.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

ns.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

ns

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

VmJhWlBoN3JGN0luTGJrd0luanNlWXVtdExmWW1kOU0=

CnC

48.209.82.191

Ports

1337

Mutex

DcRatMutex_qwqda

a48b850b6c45e196beb6c6eaf6e14eff (64.51 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

VmJhWlBoN3JGN0luTGJrd0luanNlWXVtdExmWW1kOU0=

Pastebin

-

Certificate

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

ServerSignature

Mh8Jg6saaO+HOa7r/osJ8FarYL9OkXjCS5G7iuMms+Jxz6nF0S/5naK1Txw339v9WqX0lYrevUybOdKwVeaGjvdc+pApw3wvMFtO7oLUD4lILhTz8+xGtiSOedTIadaE7AVJkzvENOYgW1VfWyZ2IAu1upcpkgSr

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Hosts

48.209.82.191

Ports

1337

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

VmJhWlBoN3JGN0luTGJrd0luanNlWXVtdExmWW1kOU0=

Malicious

a48b850b6c45e196beb6c6eaf6e14eff

CnC

48.209.82.191

Malicious

a48b850b6c45e196beb6c6eaf6e14eff

Ports

1337

Malicious

a48b850b6c45e196beb6c6eaf6e14eff

Mutex

DcRatMutex_qwqda

Malicious

a48b850b6c45e196beb6c6eaf6e14eff

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙