Suspicious
Suspect

bbe23c43616fef3bbba2950089b1d282

PE Executable
|
MD5: bbe23c43616fef3bbba2950089b1d282
|
Size: 3.39 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
bbe23c43616fef3bbba2950089b1d282
Sha1
43a6676923d819c025010d47319f4039b459d5e1
Sha256
bf60c46bb7b655a56feb99ec85c63a8ca91539e4ae6ee5d5865a3c84e36593ed
Sha384
99930fea4d8bb73c4b9c68ad55d6cdb5fcb08223a23daed2159be347fa6d8db93e10428eee7f981e15921a939ab136dc
Sha512
54b47d73edd011df465378bee89dc8402840dd51cc41a1fee9600a5ff5e03ec1c5717a7c29031f7131aaf371fc6ffff4011ba2ce689f3288d59aa4fb70b63308
SSDeep
98304:a/K/l2y66mZc+321CJflrJqUMge1q7tWh3:a/KN2BuCDJqrY7ta3
TLSH
58F5330DCAE19E72CA762D31C349903482F5EE21039AF752FC9634F51AFB7985925C8B

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

7.8.7.9

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

28

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

87

Main IL

nop <null> ldc.i4 1585436192 stloc.s V_4 ldloc.s V_4 ldc.i4 1700254631 neg <null> neg <null> not <null> xor <null> neg <null> not <null> neg <null> dup <null> stloc.3 <null> ldc.i4.6 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_0121: ret call System.Object server.Module2::_856BEC1BA8A54697_() stloc.0 <null> ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_0D3A3316AE874B6B_() call System.Object server.Module2::_4340BCD78BCA4F52_(System.Object) call System.String server.Module2::_53E3F8651D384A0D_(System.Object) call System.Boolean server.Module2::_7EF989A59EE044A3_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_2624C5CD707148A1_() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_0D3A3316AE874B6B_() call System.Object server.Module2::_4340BCD78BCA4F52_(System.Object) call System.String server.Module2::_53E3F8651D384A0D_(System.Object) call System.Boolean server.Module2::_967FD3BEBE2D433E_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_0B5698E51FBD4E2A_() stloc.2 <null> ldc.i4 -1648061591 stloc.s V_7 ldloc.3 <null> ldc.i4 -739589 mul <null> ldloc.s V_7 xor <null> br IL_0006: stloc.s V_4 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::_62C6DFB0F889474B_(System.String) stsfld System.Byte[] server.Module2::Bytes ldc.i4 644202451 stloc.s V_6 ldloc.3 <null> ldc.i4 -649652 mul <null> ldloc.s V_6 xor <null> br IL_0006: stloc.s V_4 ldloc.2 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_0D3A3316AE874B6B_() call System.Object server.Module2::_4340BCD78BCA4F52_(System.Object) call System.String server.Module2::_53E3F8651D384A0D_(System.Object) call System.Boolean server.Module2::_9B7B4EA2C0E14C4A_(System.Object,System.Byte[],System.String) pop <null> ldc.i4 -1287151558 stloc.s V_8 ldloc.3 <null> ldc.i4 -258942 mul <null> ldloc.s V_8 xor <null> br IL_0006: stloc.s V_4 call System.String server.Module2::_2ACAD5A9BB06491E_() ldc.i4 -321420769 br.s IL_00FC: call System.String <Module>::_10FCBA760C584301_<System.String>(System.IntPtr) call System.String <Module>::_10FCBA760C584301_<System.String>(System.IntPtr) call System.String server.Module2::_F5FCA4F090CE4AC7_(System.String,System.String) stsfld System.String server.Module2::Hex ldc.i4 -988440830 stloc.s V_5 ldloc.3 <null> ldc.i4 -293303 mul <null> ldloc.s V_5 xor <null> br IL_0006: stloc.s V_4 ret <null>

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

7.8.7.9

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

28

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

87

Main IL

nop <null> ldc.i4 1585436192 stloc.s V_4 ldloc.s V_4 ldc.i4 1700254631 neg <null> neg <null> not <null> xor <null> neg <null> not <null> neg <null> dup <null> stloc.3 <null> ldc.i4.6 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_0121: ret call System.Object server.Module2::_856BEC1BA8A54697_() stloc.0 <null> ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_0D3A3316AE874B6B_() call System.Object server.Module2::_4340BCD78BCA4F52_(System.Object) call System.String server.Module2::_53E3F8651D384A0D_(System.Object) call System.Boolean server.Module2::_7EF989A59EE044A3_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_2624C5CD707148A1_() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_0D3A3316AE874B6B_() call System.Object server.Module2::_4340BCD78BCA4F52_(System.Object) call System.String server.Module2::_53E3F8651D384A0D_(System.Object) call System.Boolean server.Module2::_967FD3BEBE2D433E_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_0B5698E51FBD4E2A_() stloc.2 <null> ldc.i4 -1648061591 stloc.s V_7 ldloc.3 <null> ldc.i4 -739589 mul <null> ldloc.s V_7 xor <null> br IL_0006: stloc.s V_4 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::_62C6DFB0F889474B_(System.String) stsfld System.Byte[] server.Module2::Bytes ldc.i4 644202451 stloc.s V_6 ldloc.3 <null> ldc.i4 -649652 mul <null> ldloc.s V_6 xor <null> br IL_0006: stloc.s V_4 ldloc.2 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_0D3A3316AE874B6B_() call System.Object server.Module2::_4340BCD78BCA4F52_(System.Object) call System.String server.Module2::_53E3F8651D384A0D_(System.Object) call System.Boolean server.Module2::_9B7B4EA2C0E14C4A_(System.Object,System.Byte[],System.String) pop <null> ldc.i4 -1287151558 stloc.s V_8 ldloc.3 <null> ldc.i4 -258942 mul <null> ldloc.s V_8 xor <null> br IL_0006: stloc.s V_4 call System.String server.Module2::_2ACAD5A9BB06491E_() ldc.i4 -321420769 br.s IL_00FC: call System.String <Module>::_10FCBA760C584301_<System.String>(System.IntPtr) call System.String <Module>::_10FCBA760C584301_<System.String>(System.IntPtr) call System.String server.Module2::_F5FCA4F090CE4AC7_(System.String,System.String) stsfld System.String server.Module2::Hex ldc.i4 -988440830 stloc.s V_5 ldloc.3 <null> ldc.i4 -293303 mul <null> ldloc.s V_5 xor <null> br IL_0006: stloc.s V_4 ret <null>

bbe23c43616fef3bbba2950089b1d282 (3.39 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙