Malicious
Malicious

c50b6b9a390b628d86709e94bad57d14

PE Executable
|
MD5: c50b6b9a390b628d86709e94bad57d14
|
Size: 79.87 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
c50b6b9a390b628d86709e94bad57d14
Sha1
7b3a00a35c08946e6a807cc9f3ca8b024024b446
Sha256
fc1eebb23aea55d37668aced346cdb2438f0ca0e68d5ee24881f755602946427
Sha384
552fb34f8fccf488a56d0275ae2aae1cd95a93a0f906fba00279447fc3600ccdc81864101313c6aa9bd66613996ce9ac
Sha512
a2679d67450e01d2b697457d0c6ff45be9346e072669f1a8af7e9ab2d7902048880d2480c6f355b64bfda513b84f412c276429ad76017db75cc7ac78d67870cd
SSDeep
1536:hDtA2wfLFzBSwdDYTGbb3wZxecG37r8Gvtoq9VclN:hi2wfLFz8wDuGbb3kezJt/PY
TLSH
A5737D002798C966E2AD4AF8ACF2990046B5D5772106DA5E7CC404DB6BAFFC649133FF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

N0tQdm5IUkZTdDZDenVoVVlhcHFxOEVEYnNURHNsbU8=

Pastebin

-

Certificate

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

ServerSignature

Fs6MWFIC0MFSL4hfM9a5AfrZu30/24f6tvCF4WPGJfxURHIlvnP6MCjauOveVyfSTwm2KIrqADa08gyG64cnQjvKMa2NepYtPpNztk0Q9UFY+UwytsdjATmMNUopS4zRqvWqHqInLZP9PzlGU8gTfCFNTVI2NMzmgnAwJSpOAns=

Install

true

BDOS

false

Anti-VM

false

Install File

VoidEcho.exe

Install-Folder

%AppData%

Hosts

tv88-vip.com,www.tv88-vip.com,tv88-km.cyou,www.tv88-km.cyou,ax88vn01.com,www.ax88vn01.com,kp88.ink,www.kp88.ink

Ports

1337,1604,4782

Mutex

VoidEcho_VeilTrustMutex_dafad7awi2

Version

1.0.7

Delay

1

Group

VoidEcho

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Void Echo.exe

Full Name

Void Echo.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Void Echo.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Void Echo

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Void Echo.exe

Full Name

Void Echo.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Void Echo.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Void Echo

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

N0tQdm5IUkZTdDZDenVoVVlhcHFxOEVEYnNURHNsbU8=

CnC

tv88-vip.com

CnC

www.tv88-vip.com

CnC

tv88-km.cyou

CnC

www.tv88-km.cyou

CnC

ax88vn01.com

CnC

www.ax88vn01.com

CnC

kp88.ink

CnC

www.kp88.ink

Ports

1337

Ports

1604

Ports

4782

Mutex

VoidEcho_VeilTrustMutex_dafad7awi2

c50b6b9a390b628d86709e94bad57d14 (79.87 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

N0tQdm5IUkZTdDZDenVoVVlhcHFxOEVEYnNURHNsbU8=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVAI4aqMg0mXDOnNN7b+CVCpm/oF99MA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDQyNjA5NDQxMFoXDTM2MDIwMzA5NDQxMFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAIQIsQ6iJ5BJjl9U0Me5lfMn4hwGY4WsZVRHGAnEGhbLgGXc8HRTGWd0yoy2HO4oInZ/iEIs2gew60f8XnK1HWorWHnSt0T2IRm1tJEJO3CoFFakPpGe5GSs71fhpyZevDkDiQXHRM6mr56PAeiDuChSYuRntISdFvm7iHrGLvVrAgMBAAGjMjAwMB0GA1UdDgQWBBST8O/98qCgYfVYbX3UdXhKuvkZHTAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAHyEZmk+lg+kHjGnavD6qJAGuwZQ+AOGCwOJsn9OyBSCF2N2/VkrTjJmyXPFgl+VtnscbZ9Vr6wY3odzd8YJrKyLcN3KEQJe/gNJeohoAGgdriuvnXnUYFG3HnA5csuWyuj9S5Q/RP5Vq2z8sK7GYFbroZigGMJNo7tu13EEmo/q

ServerSignature

Fs6MWFIC0MFSL4hfM9a5AfrZu30/24f6tvCF4WPGJfxURHIlvnP6MCjauOveVyfSTwm2KIrqADa08gyG64cnQjvKMa2NepYtPpNztk0Q9UFY+UwytsdjATmMNUopS4zRqvWqHqInLZP9PzlGU8gTfCFNTVI2NMzmgnAwJSpOAns=

Install

true

BDOS

false

Anti-VM

false

Install File

VoidEcho.exe

Install-Folder

%AppData%

Hosts

tv88-vip.com,www.tv88-vip.com,tv88-km.cyou,www.tv88-km.cyou,ax88vn01.com,www.ax88vn01.com,kp88.ink,www.kp88.ink

Ports

1337,1604,4782

Mutex

VoidEcho_VeilTrustMutex_dafad7awi2

Version

1.0.7

Delay

1

Group

VoidEcho

Artefacts
Name
Value Location
Key (AES_256)

N0tQdm5IUkZTdDZDenVoVVlhcHFxOEVEYnNURHNsbU8=

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

tv88-vip.com

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

www.tv88-vip.com

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

tv88-km.cyou

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

www.tv88-km.cyou

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

ax88vn01.com

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

www.ax88vn01.com

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

kp88.ink

Malicious

c50b6b9a390b628d86709e94bad57d14

CnC

www.kp88.ink

Malicious

c50b6b9a390b628d86709e94bad57d14

Ports

1337

Malicious

c50b6b9a390b628d86709e94bad57d14

Ports

1604

Malicious

c50b6b9a390b628d86709e94bad57d14

Ports

4782

Malicious

c50b6b9a390b628d86709e94bad57d14

Mutex

VoidEcho_VeilTrustMutex_dafad7awi2

Malicious

c50b6b9a390b628d86709e94bad57d14

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙