Suspicious
Suspect

b065bb1a52058a02341a9296d57b4be6

PE Executable
|
MD5: b065bb1a52058a02341a9296d57b4be6
|
Size: 2.28 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
b065bb1a52058a02341a9296d57b4be6
Sha1
8699890bc611573db80ead175c9afc29ff7dffda
Sha256
b1b8e318f9410ec883b219bbc2ef09268477d33b68567ab721e9747b49a05f1e
Sha384
0c91ea36e3c891426861e86647bf3532004e4cd6e76f6a1559d78f4394b269f08c1e7de1f70f17d16cbc18021b4101cb
Sha512
fd2c75ad339dbd6b3c10557276d30ebea81a009b2c5b30730aec0b9116f576068ce18b6c111320268573f67403063e4fa0d8d8a1adf8129115a37943e24b9251
SSDeep
24576:S/8SWeWBRYRR1qJ10m8yXP8oc5R2NntxO0KKSb7yviUSQaBaOwIRxl2S62/90yFP:wW7YRnirm2NnPlKKSb7L3wip6MaRFKq
TLSH
BEB5BF203DEB401AF1B7AF75DAD074DA9B6EF223770A965E149103470E13A41EEC723A

PeID

HQR data file
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void usjomuqndinx.rZZcaWG1zP3JtEgY083ZpojNfdPlk::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.6.5.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

4551

Main Method

System.Void usjomuqndinx.rZZcaWG1zP3JtEgY083ZpojNfdPlk::Main()

Main IL Instruction Count

11

Main IL

ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4.2 <null> call System.Void System.Windows.Forms.Application::SetUnhandledExceptionMode(System.Windows.Forms.UnhandledExceptionMode) call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.Void usjomuqndinx.rZZcaWG1zP3JtEgY083ZpojNfdPlk::FajM5IEMyuctS3yCqEhlwT() newobj System.Void usjomuqndinx.H973rskzZYldAArv1IigSX::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void usjomuqndinx.rZZcaWG1zP3JtEgY083ZpojNfdPlk::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.6.5.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

4551

Main Method

System.Void usjomuqndinx.rZZcaWG1zP3JtEgY083ZpojNfdPlk::Main()

Main IL Instruction Count

11

Main IL

ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4.2 <null> call System.Void System.Windows.Forms.Application::SetUnhandledExceptionMode(System.Windows.Forms.UnhandledExceptionMode) call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.Void usjomuqndinx.rZZcaWG1zP3JtEgY083ZpojNfdPlk::FajM5IEMyuctS3yCqEhlwT() newobj System.Void usjomuqndinx.H973rskzZYldAArv1IigSX::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
Embedded Resources

31

Suspicious Type Names (1-2 chars)

0

b065bb1a52058a02341a9296d57b4be6 (2.28 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

31

b065bb1a52058a02341a9296d57b4be6

Suspicious Type Names (1-2 chars)

0

b065bb1a52058a02341a9296d57b4be6

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙