Suspicious
Suspect

a59960f7eae0ea5d3ffbe2aa1dd4308c

PE Executable
|
MD5: a59960f7eae0ea5d3ffbe2aa1dd4308c
|
Size: 27.14 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
a59960f7eae0ea5d3ffbe2aa1dd4308c
Sha1
7dc2b6a7f8eb786667670f70c1621b3e6b4838b2
Sha256
565a7086f0703105065d5d674226cd0e99b628dc81893f01104126ef743c22aa
Sha384
b5abf0ccd3d6efa85f1b689652a65a5dd4a5c5a1f8d60b79682949d193afbf52afa6fa8825a63a122815bb7cd03a8383
Sha512
489664bf314245f2c996968e4d64fcad2a5e8a77336264e7c004f9268b58297aaf0c405ad2aacf87dafa2d4685691677a1916c0841a1a08bd779ac446315b91d
SSDeep
384:+4eMn+LbqY3zgetmQkLAMymrJhxUHqqbuUsJQxnCJf+BWfXWw/uyu+:+4nncb/3EtQk8MyCJhxaFbHBFBNyu+
TLSH
72C22B0473F48266D1ED07BE4832A200D375E68B5D53DB9F6EC495AD2A33BCD8621BE4
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: C:\Users\789BET-OKVIP\Downloads\1\AsyncRAT\AsyncRAT_partnership3\AsyncRAT-C#\Client\obj\Debug\Stub.pdb

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

111

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

56

Main IL

nop <null> nop <null> ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) stloc.0 <null> ldloc.0 <null> brfalse.s IL_0016: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() nop <null> ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse.s IL_0029: ldc.i4.0 call System.Boolean Client.Helper.Methods::IsAdmin() br.s IL_002A: stloc.1 ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> brfalse.s IL_0034: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() nop <null> call System.Void Client.Helper.Methods::PreventSleep() nop <null> nop <null> leave.s IL_0042: br.s IL_0074 pop <null> nop <null> nop <null> leave.s IL_0042: br.s IL_0074 br.s IL_0074: ldc.i4.1 nop <null> nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() ldc.i4.0 <null> ceq <null> stloc.2 <null> ldloc.2 <null> brfalse.s IL_0060: nop nop <null> call System.Void Client.Connection.ClientSocket::Reconnect() nop <null> call System.Void Client.Connection.ClientSocket::InitializeClient() nop <null> nop <null> nop <null> leave.s IL_0068: ldc.i4 5000 pop <null> nop <null> nop <null> leave.s IL_0068: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) nop <null> nop <null> ldc.i4.1 <null> stloc.3 <null> br.s IL_0044: nop

a59960f7eae0ea5d3ffbe2aa1dd4308c (27.14 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙