Malicious
Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

PE Executable
|
MD5: a7b1bd2e7a92deb5c1e11d56ca4d9461
|
Size: 119.81 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
a7b1bd2e7a92deb5c1e11d56ca4d9461
Sha1
4d3d2852e42ba4c14289848b11ff39dbdc209c93
Sha256
270887cd3939ea9eb91d47ce5eeedd4141cb112501d42844020e496c76384608
Sha384
270eeba9111a7a2aa5d6ac7faa0e8508c5fc957e7b54765d98aeaceca7de5dbec0e46f11ad6e1d9c5df0811531dd15bd
Sha512
f3d925cd0c7bfe4bb02582fdbce2dcd1e41228530c6f9357f439ecbcd752a70f16aaaa1ceef42a2687dca4847661ce6bb55f8fa1d576841b3150e4f38d79b4e5
SSDeep
3072:9ugoyTPPj2F3cv3bGoXu9BeF+YzB1hXeiYY0I26QqAN:9ugocyyv3bwBeYA/mIBpm
TLSH
B0C3B0043BD8C466F2AD4F789DF25245867EE9B73E03D94B1C84328B1623FC55B42AB9

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

NDJENXUzM0pSNjRUbDQxd3dzYlRyNDB0bWszWnQ2VjA=

Pastebin

-

Certificate

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

ServerSignature

kKA8ShOo+gm2p5gn2G3QerRn6VlcYjUk4xeEdI/rPlHESy1sgdkAzOelZaq1HzhSvmCZXwrEnbH4yWym5SxESJ61uH27k8JFkuhVu7vRJ3sKOGFHhJjsrSl2YA0CjtoTWwKcbkVnfOYlrAQiMIar51gkHg9tUsaREQkjQLl/Qvjq4VZjJrLjXIhqvqANTUkLcQIjaUgkxgS5gfaDGbIocGW3iwrSSMpmBxl/0Kqo6RDZy6UcVllwpy3L4vnjrKwJNtAqczt8uzqx9nG2xAwDwzFknj5lj2mssP0LlpIXToa7XdNSDYKtaQDR/X4j7KGCI51HA461ByqoliTdpyQVpewdvgf99EQfQH0i6ZjUllrGZlkclmBGANivo7v67s8k6ukMAd2giAS1UGDeHFNcsSf2YzGFlOaatVxzm5bhC4ubTnGHRlMteByHhesU/dKNZhPrM7rlqlb5HA3XX7MK8HvAfFOxuj7Ddv9ndRPYZO7hUvYXcQTMZpSvusobiFFbfOoG67stFpyyXQSxE24yXznlwl3ktxKDDgwNJB+xbjzobSk9kykM42t+UVBX0F3AW/jfrJhX95eBPsL9VvcMnJi8sWftvvZBe5FscR/s5V0QwOWkh9JP361u6y4b3MTzmZRowm4L3hOyRwGx5EeeFjWG6XvJXedtBa+aibEXMww=

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Version

0.5.7B

Hosts

mestizo.co.com,cooltool.jp.net,holidayonid.com.co,e-shop.it.com

Ports

22,80,443,6606,7707,8808

Mutex

xgclgdlwruwu

Delay

3

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

WinRar.exe

Full Name

WinRar.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

WinRar.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

WinRar

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

120

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

51

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0043: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0057: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() call System.Void Client.Helper.Methods::PreventSleep() leave IL_0099: nop pop <null> leave IL_0099: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00AE: leave IL_00B9 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00B9: ldc.i4 5000 pop <null> leave IL_00B9: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_0099: nop

Module Name

WinRar.exe

Full Name

WinRar.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

WinRar.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

WinRar

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

120

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

51

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0043: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0057: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_006B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_0089: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() call System.Void Client.Helper.Methods::PreventSleep() leave IL_0099: nop pop <null> leave IL_0099: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_00AE: leave IL_00B9 call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_00B9: ldc.i4 5000 pop <null> leave IL_00B9: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_0099: nop

Artefacts
Name
Value
Key (AES_256)

NDJENXUzM0pSNjRUbDQxd3dzYlRyNDB0bWszWnQ2VjA=

CnC

mestizo.co.com

CnC

cooltool.jp.net

CnC

holidayonid.com.co

CnC

e-shop.it.com

Ports

22

Ports

80

Ports

443

Ports

6606

Ports

7707

Ports

8808

Mutex

xgclgdlwruwu

a7b1bd2e7a92deb5c1e11d56ca4d9461 (119.81 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
ID:0007
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

NDJENXUzM0pSNjRUbDQxd3dzYlRyNDB0bWszWnQ2VjA=

Pastebin

-

Certificate

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

ServerSignature

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

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Version

0.5.7B

Hosts

mestizo.co.com,cooltool.jp.net,holidayonid.com.co,e-shop.it.com

Ports

22,80,443,6606,7707,8808

Mutex

xgclgdlwruwu

Delay

3

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

NDJENXUzM0pSNjRUbDQxd3dzYlRyNDB0bWszWnQ2VjA=

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

CnC

mestizo.co.com

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

CnC

cooltool.jp.net

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

CnC

holidayonid.com.co

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

CnC

e-shop.it.com

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

Ports

22

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

Ports

80

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

Ports

443

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

Ports

6606

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

Ports

7707

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

Ports

8808

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

Mutex

xgclgdlwruwu

Malicious

a7b1bd2e7a92deb5c1e11d56ca4d9461

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙