Malicious
Malicious

a58990bf71a1eb82a13d3b2df860f944

PE Executable
|
MD5: a58990bf71a1eb82a13d3b2df860f944
|
Size: 138.75 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
a58990bf71a1eb82a13d3b2df860f944
Sha1
ae06f05a21152f01fd10de266b168e2f83b5f91f
Sha256
09a8ffc1121140f4f6969630e2ada1f9f3766917260871f8d0437c16557d9e86
Sha384
f89a6a28513b85cfbf0a6508d862483d445045dc47385bd693caaf66cc115a597d310a32fa86f5e41ec693b79bcdbb2b
Sha512
d93c48469913a8f674640f7b5aa3be6e554c6f8f274a832af68fa3cea4e6593c377145cd63e01488b5bd3813ebfea6ee312062a439ec8fc94a576fd9f6061fe9
SSDeep
3072:QRbrkQyGbbPVKN9BeF+YzB1hXeiYY0I26QqxqY:0Mhkb0TBeYA/mIBpk
TLSH
09D3C0052748C861E2DD4AB8EDF2564446B5CDB72406DA0E7CC425CF6BAEFC91A037FA

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

c09FV0VYWVNjWndEeTRVUVp5ZTBVTVNrMEVmWWxLYnM=

Pastebin

-

Certificate

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

ServerSignature

BBDPKvjQ8qs3uu7vVD/OmjyDzh+mUfFQzUWaWXSWvT6vBB1kyrwqweebSs1KCpEwdVjINNtuqN7zQcEWy+ZQnf1k6tUO0Uv0hMI+vUePV+oH6mjb2p8d0mTVidK5wWcJS8BRP/eu0tSC29Xdi/n6/k2JUugQw/3i9AtlfKfKaLI=

Install

true

BDOS

false

Anti-VM

false

Install File

Winrarr.exe

Install-Folder

%AppData%

Hosts

motchillie.io,motphimr.sh,motfimchill.com,80win.net,0uyy41.com,www.motchillie.io,www.motphimr.sh,www.motfimchill.com,www.80win.net,www.0uyy41.com

Ports

80,443,2053,2083,2087,2096,4782,8080,8848,8888

Mutex

SGID_CitadelNetwork_PhantomLock_7r8s9t0u

Version

1.0.7

Delay

1

Group

Horizon

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Winrarr.exe

Full Name

Winrarr.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Winrarr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Winrarr

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Winrarr.exe

Full Name

Winrarr.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Winrarr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Winrarr

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

c09FV0VYWVNjWndEeTRVUVp5ZTBVTVNrMEVmWWxLYnM=

CnC

motchillie.io

CnC

motphimr.sh

CnC

motfimchill.com

CnC

80win.net

CnC

0uyy41.com

CnC

www.motchillie.io

CnC

www.motphimr.sh

CnC

www.motfimchill.com

CnC

www.80win.net

CnC

www.0uyy41.com

Ports

80

Ports

443

Ports

2053

Ports

2083

Ports

2087

Ports

2096

Ports

4782

Ports

8080

Ports

8848

Ports

8888

Mutex

SGID_CitadelNetwork_PhantomLock_7r8s9t0u

a58990bf71a1eb82a13d3b2df860f944 (138.75 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

c09FV0VYWVNjWndEeTRVUVp5ZTBVTVNrMEVmWWxLYnM=

Pastebin

-

Certificate

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

ServerSignature

BBDPKvjQ8qs3uu7vVD/OmjyDzh+mUfFQzUWaWXSWvT6vBB1kyrwqweebSs1KCpEwdVjINNtuqN7zQcEWy+ZQnf1k6tUO0Uv0hMI+vUePV+oH6mjb2p8d0mTVidK5wWcJS8BRP/eu0tSC29Xdi/n6/k2JUugQw/3i9AtlfKfKaLI=

Install

true

BDOS

false

Anti-VM

false

Install File

Winrarr.exe

Install-Folder

%AppData%

Hosts

motchillie.io,motphimr.sh,motfimchill.com,80win.net,0uyy41.com,www.motchillie.io,www.motphimr.sh,www.motfimchill.com,www.80win.net,www.0uyy41.com

Ports

80,443,2053,2083,2087,2096,4782,8080,8848,8888

Mutex

SGID_CitadelNetwork_PhantomLock_7r8s9t0u

Version

1.0.7

Delay

1

Group

Horizon

Artefacts
Name
Value Location
Key (AES_256)

c09FV0VYWVNjWndEeTRVUVp5ZTBVTVNrMEVmWWxLYnM=

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

motchillie.io

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

motphimr.sh

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

motfimchill.com

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

80win.net

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

0uyy41.com

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

www.motchillie.io

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

www.motphimr.sh

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

www.motfimchill.com

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

www.80win.net

Malicious

a58990bf71a1eb82a13d3b2df860f944

CnC

www.0uyy41.com

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

80

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

443

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

2053

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

2083

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

2087

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

2096

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

4782

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

8080

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

8848

Malicious

a58990bf71a1eb82a13d3b2df860f944

Ports

8888

Malicious

a58990bf71a1eb82a13d3b2df860f944

Mutex

SGID_CitadelNetwork_PhantomLock_7r8s9t0u

Malicious

a58990bf71a1eb82a13d3b2df860f944

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙