Malicious
Malicious

bcf86541ac922d8c6fc518db0f46d88b

PE Executable
|
MD5: bcf86541ac922d8c6fc518db0f46d88b
|
Size: 28.67 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
bcf86541ac922d8c6fc518db0f46d88b
Sha1
4bb63936a7ca076ad8b170e49b5a4337afc3d1f4
Sha256
351e37f699f677c00617189853bf808be77ca8ce0b10762dec8a076365160fe4
Sha384
8514dd8c09eda9e7e303741f17fdc7c491658c3e0ed4e2f14df0f5e83cec70a54494b4ebca484e099406e55a6ba39daf
Sha512
6866e36beefc4be9d0c4613e49a724336d2aeb37d865d16255575d607b3ada5bfe6fea633c6c5bcc46d9c7d0f4f2fc7bc824f31309b50702176e1452346bd7cd
SSDeep
384:QPF8QkK0MUzYWBoy3Kh6h4/IyH9qbuUscC/QxnCJfJbndnjJmkT7uadT+:QPFRpmYwfKWwIb1xBibnaknuadT+
TLSH
68D21B0473E8C566E1FD47BA883396108775E95B4913DB6E1FC890AE2A63BCD8A14BD0
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

U2VjdXJlUmFuZG9tS2V5Rm9yUmF0MjAyNlByb2plY3Q=

Pastebin

-

Install

false

Install File

au88app.exe

Install-Folder

%MTX%

Version

0.5.7B

Hosts

coach-factoryoutletonline.com.co

Ports

43

Mutex

AppData

Delay

0

Group

Debug

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: C:\wow\update\obj\Debug\AU88APP.pdb

Module Name

AU88APP.exe

Full Name

AU88APP.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

AU88APP.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

AU88APP

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

123

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

101

Main IL

nop <null> ldc.i4.0 <null> stloc.0 <null> br.s IL_0016: ldloc.0 nop <null> ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) nop <null> nop <null> ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::Delay call System.Int32 System.Convert::ToInt32(System.String) clt <null> stloc.1 <null> ldloc.1 <null> brtrue.s IL_0005: nop call System.Boolean Client.Settings::InitializeSettings() ldc.i4.0 <null> ceq <null> stloc.2 <null> ldloc.2 <null> brfalse.s IL_003A: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> nop <null> nop <null> call System.Boolean Client.Helper.MutexControl::CreateMutex() ldc.i4.0 <null> ceq <null> stloc.3 <null> ldloc.3 <null> brfalse.s IL_004F: ldsfld System.String Client.Settings::Anti ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::Anti call System.Boolean System.Convert::ToBoolean(System.String) stloc.s V_4 ldloc.s V_4 brfalse.s IL_0065: ldsfld System.String Client.Settings::Install call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() nop <null> ldsfld System.String Client.Settings::Install call System.Boolean System.Convert::ToBoolean(System.String) stloc.s V_5 ldloc.s V_5 brfalse.s IL_007B: ldsfld System.String Client.Settings::BDOS call System.Void Client.Install.NormalStartup::Install() nop <null> ldsfld System.String Client.Settings::BDOS call System.Boolean System.Convert::ToBoolean(System.String) brfalse.s IL_008E: ldc.i4.0 call System.Boolean Client.Helper.Methods::IsAdmin() br.s IL_008F: stloc.s V_6 ldc.i4.0 <null> stloc.s V_6 ldloc.s V_6 brfalse.s IL_009B: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.ProcessCritical::Set() nop <null> call System.Void Client.Helper.Methods::PreventSleep() nop <null> nop <null> leave.s IL_00A9: br.s IL_00DD pop <null> nop <null> nop <null> leave.s IL_00A9: br.s IL_00DD br.s IL_00DD: ldc.i4.1 nop <null> nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() ldc.i4.0 <null> ceq <null> stloc.s V_7 ldloc.s V_7 brfalse.s IL_00C9: nop nop <null> call System.Void Client.Connection.ClientSocket::Reconnect() nop <null> call System.Void Client.Connection.ClientSocket::InitializeClient() nop <null> nop <null> nop <null> leave.s IL_00D1: ldc.i4 5000 pop <null> nop <null> nop <null> leave.s IL_00D1: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) nop <null> nop <null> ldc.i4.1 <null> stloc.s V_8 br.s IL_00AB: nop

Artefacts
Name
Value
Key (AES_256)

U2VjdXJlUmFuZG9tS2V5Rm9yUmF0MjAyNlByb2plY3Q=

CnC

coach-factoryoutletonline.com.co

Ports

43

Mutex

AppData

bcf86541ac922d8c6fc518db0f46d88b (28.67 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - AsyncRAT config.
Config. Field
Value
Key (AES_256)

U2VjdXJlUmFuZG9tS2V5Rm9yUmF0MjAyNlByb2plY3Q=

Pastebin

-

Install

false

Install File

au88app.exe

Install-Folder

%MTX%

Version

0.5.7B

Hosts

coach-factoryoutletonline.com.co

Ports

43

Mutex

AppData

Delay

0

Group

Debug

Artefacts
Name
Value Location
Key (AES_256)

U2VjdXJlUmFuZG9tS2V5Rm9yUmF0MjAyNlByb2plY3Q=

Malicious

bcf86541ac922d8c6fc518db0f46d88b

CnC

coach-factoryoutletonline.com.co

Malicious

bcf86541ac922d8c6fc518db0f46d88b

Ports

43

Malicious

bcf86541ac922d8c6fc518db0f46d88b

Mutex

AppData

Malicious

bcf86541ac922d8c6fc518db0f46d88b

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙