Suspicious
Suspect

a78c41e8241781f6397af26d2457ae54

PE Executable
|
MD5: a78c41e8241781f6397af26d2457ae54
|
Size: 1.34 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
a78c41e8241781f6397af26d2457ae54
Sha1
aa5baddc9c3e63248c6221c277b8314b5c53aa78
Sha256
2e81d3ab2fa4534bc1d7c475a53747fff869a7adde5e7453ca288e1aa0a62d7d
Sha384
a68a49e4421cceb050f80ca023ef812a3a6f9435b833584521d3fc7f7b598d3df98c56289e6f041dffdd938e60c6ea50
Sha512
9e4c2203b64b4be4e134ad6eefd1fd3ef6adbf9b31629da6312e3084dd3786f1af48f051bf72f4726a0b9f1ac0cdbdb891231da7daf48a96910b6d4cc78ca4df
SSDeep
24576:DmyDcyi0FAtT+CvRLnBrdbxSwfCl+RnWn0OYPFIIpF9WAOqvh/CucUjTx0WKbjep:20m0CvRLnBrdJWn2Nz9WAfC7UjTx05f0
TLSH
6C552394728EF0B2E5C206359CF929134196F163B5A3D7BE2DC1BCAE310E9E4998DD43

PeID

Microsoft Visual C++ DLL
Microsoft Visual C++ v6.0
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
dmyu
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Fqjul.exe

Full Name

Fqjul.exe

EntryPoint

System.Void Oipbmqajiem.Qpmgdraecb::Main()

Scope Name

Fqjul.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Fqjul

Assembly Version

1.0.5785.2086

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

11

Main Method

System.Void Oipbmqajiem.Qpmgdraecb::Main()

Main IL Instruction Count

194

Main IL

nop <null> ldc.i4 4032 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) br IL_0136: ldc.i4.s 13 nop <null> nop <null> ldsfld l[] l::e stloc.0 <null> br.s IL_001E: ldc.i4.8 ldnull <null> stloc.0 <null> br.s IL_0023: nop ldc.i4.8 <null> ldc.i4.s -51 bgt.s IL_001A: ldnull nop <null> leave.s IL_002B: ldc.i4 5628 pop <null> nop <null> nop <null> leave.s IL_002B: ldc.i4 5628 ldc.i4 5628 call System.String m::a(System.Int32) newobj System.Void System.Version::.ctor(System.String) stloc.1 <null> br IL_00CE: ldc.i4.s 20 ldloc.s V_8 ldc.i4.s 37 xor <null> stloc.s V_8 br.s IL_0096: ldc.i4.s 37 ldloc.s V_9 ldc.i4.s 34 xor <null> stloc.s V_9 br.s IL_006F: ldc.i4.s 69 ldloc.s V_10 ldc.i4.s 46 xor <null> stloc.s V_10 ldloc.s V_10 ldc.i4.s 60 add <null> switch dnlib.DotNet.Emit.Instruction[] ldc.i4.s 69 call System.Int32 k::e(System.Int32) stloc.s V_10 br.s IL_0052: ldloc.s V_10 ldloc.s V_9 ldc.i4.s 32 add <null> switch dnlib.DotNet.Emit.Instruction[] ldc.i4.s -21 stloc.s V_10 br.s IL_0052: ldloc.s V_10 ldc.i4.s 37 call System.Int32 Oipbmqajiem.Hspsybjg::a(System.Int32) stloc.s V_9 ldc.i4.s -24 stloc.s V_10 br.s IL_0052: ldloc.s V_10 br.s IL_0049: ldloc.s V_9 ldloc.s V_8 ldc.i4.s 31 sub <null> switch dnlib.DotNet.Emit.Instruction[] ldc.i4.s -61 stloc.s V_9 br IL_0049: ldloc.s V_9 ldc.i4.s 20 call System.Int32 j::c(System.Int32) stloc.s V_8 ldc.i4.s -64 stloc.s V_9 br IL_0049: ldloc.s V_9 br IL_0040: ldloc.s V_8 newobj System.Void h::.ctor() stloc.3 <null> ldc.i4.s 18 call System.Int32 j::c(System.Int32) stloc.s V_8 br IL_0040: ldloc.s V_8 ldnull <null> ldloc.1 <null> newobj System.Void g::.ctor(System.String,System.Version) stloc.2 <null> ldc.i4.s 58 stloc.s V_8 br IL_0040: ldloc.s V_8 newobj System.Void j::.ctor() stloc.s V_5 ldc.i4.6 <null> stloc.s V_8 br IL_0040: ldloc.s V_8 newobj System.Void i::.ctor() stloc.s V_4 ldc.i4.4 <null> stloc.s V_8 br IL_0040: ldloc.s V_8 ldloc.3 <null> ldloc.s V_4 ldloc.s V_5 newobj System.Void k::.ctor(h,i,j) stloc.s V_6 br.s IL_013F: nop ldc.i4.s 13 ldc.i4.s 98 blt IL_0010: nop nop <null> ldloc.2 <null> ldloc.s V_6 ldftn System.Void k::a(System.Object,a) newobj System.Void System.EventHandler`1<a>::.ctor(System.Object,System.IntPtr) callvirt System.Void g::add_a(System.EventHandler`1<a>) br.s IL_0192: ldc.i4.s 18 ldloc.s V_7 ldc.i4.s 17 xor <null> stloc.s V_7 ldloc.s V_7 ldc.i4.s 21 sub <null> switch dnlib.DotNet.Emit.Instruction[] ldc.i4.s 18 call System.Int32 j::c(System.Int32) stloc.s V_7 br.s IL_0155: ldloc.s V_7 ldloc.s V_5 ldloc.s V_6 ldftn System.Void k::d(System.Object,d) newobj System.Void System.EventHandler`1<d>::.ctor(System.Object,System.IntPtr) callvirt System.Void j::add_a(System.EventHandler`1<d>) ldc.i4.6 <null> stloc.s V_7 br.s IL_0155: ldloc.s V_7 nop <null> ldc.i4.s 15 stloc.s V_7 br.s IL_0155: ldloc.s V_7 nop <null> ldc.i4.s 10 stloc.s V_7 br.s IL_0155: ldloc.s V_7 nop <null> ldc.i4.8 <null> stloc.s V_7 br.s IL_0155: ldloc.s V_7 ldloc.s V_4 ldloc.s V_6 ldftn System.Void k::c(System.Object,c) newobj System.Void System.EventHandler`1<c>::.ctor(System.Object,System.IntPtr) callvirt System.Void i::add_a(System.EventHandler`1<c>) ldc.i4.s 13 stloc.s V_7 br IL_0155: ldloc.s V_7 nop <null> ldc.i4.s 14 stloc.s V_7 br IL_0155: ldloc.s V_7 ldloc.2 <null> callvirt System.Void g::a() ldc.i4.s 12 stloc.s V_7 br IL_0155: ldloc.s V_7 nop <null> ldc.i4.4 <null> stloc.s V_7 br IL_0155: ldloc.s V_7 nop <null> ldc.i4.s 29 call System.Int32 u/a::aq(System.Int32) stloc.s V_7 br IL_0155: ldloc.s V_7 ldloc.3 <null> ldloc.s V_6 ldftn System.Void k::b(System.Object,b) newobj System.Void System.EventHandler`1<b>::.ctor(System.Object,System.IntPtr) callvirt System.Void h::add_a(System.EventHandler`1<b>) ldc.i4.s 9 stloc.s V_7 br IL_0155: ldloc.s V_7 leave.s IL_024B: ret ldloc.s V_6 brfalse.s IL_023D: ldc.i4.1 ldc.i4.0 <null> br.s IL_0240: brtrue.s IL_024A ldc.i4.1 <null> br.s IL_0240: brtrue.s IL_024A brtrue.s IL_024A: endfinally ldloc.s V_6 callvirt System.Void System.IDisposable::Dispose() nop <null> endfinally <null> ret <null>

a78c41e8241781f6397af26d2457ae54 (1.34 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
dmyu
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙