Malicious
Malicious

c10f8301f217bbfdbdcc915f27f3cd76

PE Executable
|
MD5: c10f8301f217bbfdbdcc915f27f3cd76
|
Size: 66.05 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
c10f8301f217bbfdbdcc915f27f3cd76
Sha1
6a5038bdadd12ae1b5c8830a32fc75d881b45309
Sha256
07633175862d8e362fc8b19dad17e955528c2ffb7afd164ebaa06496ef3d3bd2
Sha384
23ca64c9d7a0ae06d52e10c354fa0d1e04aee4d0ffeb08875568914cabf245cb804a2a9da4d6aaae1465aad9fa0e5948
Sha512
86c127b3d0395be8de2a5ad8dddd30ca45fa74c746be9dfb88c222d00253cc5b85760817be87e1bd23b56cf07e8f99ceaecfdcf8468e9ec1302f2c6a46fd92c7
SSDeep
768:FesZE8giwiPanvix9JYWwdcw9bqhAX1+VSCs7mqb2nQpwH1oDZ01rR2G8G5YVc6c:FeTivvHeZOhaXTbbXwTtGG5YVclN
TLSH
AB536B002798C961E1AD4AF4ACF255404AB1D5372112DA5E7CC815CB9BAFFC64A237FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

N3J1YmloQ0FhdFF1T1ZGVzREMUtzZDJXT3djcjJuSlM=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVAMis7lcdT+wU9VD3/IX301ufmZbDMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDMyNzAxMzMzOVoXDTM2MDEwNDAxMzMzOVowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ9LcpyTYQ8OmJAaFsg21ICvNro3tiqOu91m4kF+5Dm41/LNHsathepPzmivZgC+n3dqokqvrVdbmrBfpzxvAFqDviHxH9nvNOszDdx3Su6RmVndNFShIFDAfc6Dv15L650MOtq/dEi/U9OJXBjkW4sRrlsz559QEbrNBsNJhSpjAgMBAAGjMjAwMB0GA1UdDgQWBBQUeYdKJbi05fK7gQhYHeSlux8D0DAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAAuH0OQ0WhcdFFJiXuirZ0KE5Q+GuaKjwQJ4P7fga4xczbVowT4WliFO/MWLFjRgMZd8jpfuIvmpkp/Zlo531+xp0lNlrypnxDX2w8rOVsBNlWDKOfUrI1dsBHYvj6ywh01hA6sX+WQac5ZeiuNQ06bBYZ9FHCperBY4JNay/co9

ServerSignature

aKbFza5oZSymxlL3CC5UKIV1X6BXdEdt4QIobgRDa4N3Di8xIsLgKkzkdrJdDJY5LnQjcIyDzTi5cyI0o5Qpj0N4EAr8vPfs+iZHVoSgLMulSwMPRXtOp9BOD+q5qYiW54RPuauTyxKDR/vgxMNweh6Q+DAvc0oHgljLAQS9UzQ=

Install

true

BDOS

false

Anti-VM

false

Install File

Virexa_client.exe

Install-Folder

%AppData%

Hosts

ipv6.eu.com,zun.uk.com,sunwin11.us.com,firstcall.eu.com,iez.uk.com,www.ipv6.eu.com,www.zun.uk.com,www.sunwin11.us.com,www.firstcall.eu.com,www.iez.uk.com

Ports

80,443,4444,4782,5555,6060,6666,8080,8848

Mutex

VIREXA_CORE_SINGLE_INSTANCE_MUTEX

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Virexa.exe

Full Name

Virexa.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Virexa.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Virexa

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Virexa.exe

Full Name

Virexa.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Virexa.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Virexa

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

N3J1YmloQ0FhdFF1T1ZGVzREMUtzZDJXT3djcjJuSlM=

CnC

ipv6.eu.com

CnC

zun.uk.com

CnC

sunwin11.us.com

CnC

firstcall.eu.com

CnC

iez.uk.com

CnC

www.ipv6.eu.com

CnC

www.zun.uk.com

CnC

www.sunwin11.us.com

CnC

www.firstcall.eu.com

CnC

www.iez.uk.com

Ports

80

Ports

443

Ports

4444

Ports

4782

Ports

5555

Ports

6060

Ports

6666

Ports

8080

Ports

8848

Mutex

VIREXA_CORE_SINGLE_INSTANCE_MUTEX

c10f8301f217bbfdbdcc915f27f3cd76 (66.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

N3J1YmloQ0FhdFF1T1ZGVzREMUtzZDJXT3djcjJuSlM=

Pastebin

-

Certificate

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

ServerSignature

aKbFza5oZSymxlL3CC5UKIV1X6BXdEdt4QIobgRDa4N3Di8xIsLgKkzkdrJdDJY5LnQjcIyDzTi5cyI0o5Qpj0N4EAr8vPfs+iZHVoSgLMulSwMPRXtOp9BOD+q5qYiW54RPuauTyxKDR/vgxMNweh6Q+DAvc0oHgljLAQS9UzQ=

Install

true

BDOS

false

Anti-VM

false

Install File

Virexa_client.exe

Install-Folder

%AppData%

Hosts

ipv6.eu.com,zun.uk.com,sunwin11.us.com,firstcall.eu.com,iez.uk.com,www.ipv6.eu.com,www.zun.uk.com,www.sunwin11.us.com,www.firstcall.eu.com,www.iez.uk.com

Ports

80,443,4444,4782,5555,6060,6666,8080,8848

Mutex

VIREXA_CORE_SINGLE_INSTANCE_MUTEX

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

N3J1YmloQ0FhdFF1T1ZGVzREMUtzZDJXT3djcjJuSlM=

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

ipv6.eu.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

zun.uk.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

sunwin11.us.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

firstcall.eu.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

iez.uk.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

www.ipv6.eu.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

www.zun.uk.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

www.sunwin11.us.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

www.firstcall.eu.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

CnC

www.iez.uk.com

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

80

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

443

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

4444

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

4782

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

5555

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

6060

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

6666

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

8080

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Ports

8848

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

Mutex

VIREXA_CORE_SINGLE_INSTANCE_MUTEX

Malicious

c10f8301f217bbfdbdcc915f27f3cd76

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙