Malicious
Malicious

b50433d42b97243f74f18fc4947e1865

PE Executable
|
MD5: b50433d42b97243f74f18fc4947e1865
|
Size: 91.65 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
b50433d42b97243f74f18fc4947e1865
Sha1
ce22c7f638fc578dd7d4d058a9028d6516dd9597
Sha256
dcb2e4afc536fa90a4ae9ce81ff31ee38ad501f59a89f1b6d18674778ab2f31f
Sha384
d3565e54895561051b7e679036131df4b098f6596692572403896d587ea3ba98a848f87e5c18ec128268ccd994359316
Sha512
840176f244f688b88b331e76d82cb7d98369a533b72b82b97eecc200978b7828a65fc8221f705fb73810b77ec636b725405262f86872b835ef82dd22c34ea11e
SSDeep
1536:nFH80e6wkApSgvA3GbbS/a1SHSGGuQpPCCAf3cHVclN:n+0e6wXaGbbSC1SH09CCo3c1Y
TLSH
BD93AE002798C965E2AD4AB4BCF3910106B5D5772002CB5EBCC815DBAB9FFC54A266FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

cWVHTFNIYzRJemt2VjdIdUsweElSS2FkdVpSNXVaOW0=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVALV2hi3nDM88rPB/M+k+VIWkqiwpMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDQxMDE0MzgxNFoXDTM2MDExODE0MzgxNFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALu1/TPbf4WQAMY4lBsw1V9BE5NJoMEVaoZJpruwyZmgadVZ7ePGdMWMsG3k+/NF6Cz1dZE613KPO6z0hVyPisWurgoyGYMtg6jUuIL/H3x9IvUm2Riz8oMduRAGRMRI1iIEvoiwslly4ETLcdz8rrmic00CCAd8diqjbvWOHwcFAgMBAAGjMjAwMB0GA1UdDgQWBBRs6/fysekOOsqmPQXMl1JdplMoajAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAExlcGELH6yyl+ijRGy5jh75mPg6zxed3//3cSuqPHMMdkK/N/q1d9BEqy7py30aJrpDiMXRJedqa8xyHRfLoEQ7k8P7IFRsIeLBXZuSOICorcn8jwyTumKR+RIkNfIZvM49g7MLXqXTaPGELWi2Yr9qJi5xwMxl0UeqJfqXgmDE

ServerSignature

uzjqw5QwXcHLF19oCfMqlYhRl0hP07101qACoze5Bw8vyIz5R0a2v0W/XsixP2dGhOCLIvHdje+0rAORVSwy+rRP2A4nwz2Zh1IOKBrovcr7FqjI9uAWCNWSYQG2walEkD7XBkIgATkrwvlPY621v8+IGoeq8DduDR39osFEaAU=

Install

true

BDOS

false

Anti-VM

false

Install File

vlxx.eu.com.exe

Install-Folder

%AppData%

Ports

443,1604,4782,8080,8848

Mutex

ApexQuantum_TrustMutex_v2036

Version

1.0.7

Delay

1

Group

ApexForge

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

vlxx.eu.com

Full Name

vlxx.eu.com

EntryPoint

System.Void Client.Program::Main()

Scope Name

vlxx.eu.com

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

vlxx.eu

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

vlxx.eu.com

Full Name

vlxx.eu.com

EntryPoint

System.Void Client.Program::Main()

Scope Name

vlxx.eu.com

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

vlxx.eu

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

cWVHTFNIYzRJemt2VjdIdUsweElSS2FkdVpSNXVaOW0=

Ports

443

Ports

1604

Ports

4782

Ports

8080

Ports

8848

Mutex

ApexQuantum_TrustMutex_v2036

b50433d42b97243f74f18fc4947e1865 (91.65 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

cWVHTFNIYzRJemt2VjdIdUsweElSS2FkdVpSNXVaOW0=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVALV2hi3nDM88rPB/M+k+VIWkqiwpMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDQxMDE0MzgxNFoXDTM2MDExODE0MzgxNFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALu1/TPbf4WQAMY4lBsw1V9BE5NJoMEVaoZJpruwyZmgadVZ7ePGdMWMsG3k+/NF6Cz1dZE613KPO6z0hVyPisWurgoyGYMtg6jUuIL/H3x9IvUm2Riz8oMduRAGRMRI1iIEvoiwslly4ETLcdz8rrmic00CCAd8diqjbvWOHwcFAgMBAAGjMjAwMB0GA1UdDgQWBBRs6/fysekOOsqmPQXMl1JdplMoajAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAExlcGELH6yyl+ijRGy5jh75mPg6zxed3//3cSuqPHMMdkK/N/q1d9BEqy7py30aJrpDiMXRJedqa8xyHRfLoEQ7k8P7IFRsIeLBXZuSOICorcn8jwyTumKR+RIkNfIZvM49g7MLXqXTaPGELWi2Yr9qJi5xwMxl0UeqJfqXgmDE

ServerSignature

uzjqw5QwXcHLF19oCfMqlYhRl0hP07101qACoze5Bw8vyIz5R0a2v0W/XsixP2dGhOCLIvHdje+0rAORVSwy+rRP2A4nwz2Zh1IOKBrovcr7FqjI9uAWCNWSYQG2walEkD7XBkIgATkrwvlPY621v8+IGoeq8DduDR39osFEaAU=

Install

true

BDOS

false

Anti-VM

false

Install File

vlxx.eu.com.exe

Install-Folder

%AppData%

Ports

443,1604,4782,8080,8848

Mutex

ApexQuantum_TrustMutex_v2036

Version

1.0.7

Delay

1

Group

ApexForge

Artefacts
Name
Value Location
Key (AES_256)

cWVHTFNIYzRJemt2VjdIdUsweElSS2FkdVpSNXVaOW0=

Malicious

b50433d42b97243f74f18fc4947e1865

Ports

443

Malicious

b50433d42b97243f74f18fc4947e1865

Ports

1604

Malicious

b50433d42b97243f74f18fc4947e1865

Ports

4782

Malicious

b50433d42b97243f74f18fc4947e1865

Ports

8080

Malicious

b50433d42b97243f74f18fc4947e1865

Ports

8848

Malicious

b50433d42b97243f74f18fc4947e1865

Mutex

ApexQuantum_TrustMutex_v2036

Malicious

b50433d42b97243f74f18fc4947e1865

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙