Suspicious
Suspect

c89d602844da0173a9f50b7e29727b00

PE Executable
|
MD5: c89d602844da0173a9f50b7e29727b00
|
Size: 348.16 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Very high

Hash
Hash Value
MD5
c89d602844da0173a9f50b7e29727b00
Sha1
a9756eb2b924111398c6129c0124e64cd29f7499
Sha256
16788394ce3268cfde44286f40c5d17cfa90151532b6b0339f2e27a8ecf0a6bc
Sha384
f3b1b0f07cc7af046fa25419d0ff9bf76901ec629fc43400c3c3429cef7f94f23dbedbf37a03186ec6b13266059716b3
Sha512
f08b88cb14106c6dae946dedd8d4f3242b8b9fe72cbff39c504be92fd0ae6f87420c5d9106be3303d6fb50b68cc6090c2fdaa03f6740544309e25578dc0911d0
SSDeep
6144:6IS0SEqTde6VlWT8b9hPbfXvwWBlboZP:bSbPVle8nTXwWBEP
TLSH
F374D50CFF91E806CE2E3D77CBE610004B7125C26F21925675496FFE8B6637658A62BC

PeID

.NET executable
HQR data file
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
aiucpyhmphld
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

CrackLoader.exe

Full Name

CrackLoader.exe

EntryPoint

System.Void sNIGzJwCK.FqSidViXcWrVfxh::OYWmzsWKjtH(System.String[])

Scope Name

CrackLoader.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

CrackLoader

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

925

Main Method

System.Void sNIGzJwCK.FqSidViXcWrVfxh::OYWmzsWKjtH(System.String[])

Main IL Instruction Count

57

Main IL

ldc.i4 5983 stloc.0 <null> br IL_00C4: br IL_000B nop <null> ldloc.0 <null> ldc.i4 6007 ceq <null> brfalse IL_0024: nop call System.Void sNIGzJwCK.KWXcnahbVyYE::tooJCBmD() ldc.i4 6014 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 6003 ceq <null> brfalse IL_0083: nop newobj System.Void System.Random::.ctor() nop <null> ldc.r8 6000 ldc.r8 2000 call System.Double System.Math::Ceiling(System.Double) sub <null> call System.Int32 System.Convert::ToInt32(System.Double) nop <null> ldc.r8 6000.219189974283 ldc.r8 3000 call System.Double System.Math::Sin(System.Double) sub <null> call System.Int32 System.Convert::ToInt32(System.Double) callvirt System.Int32 System.Random::Next(System.Int32,System.Int32) call System.Void System.Threading.Thread::Sleep(System.Int32) ldc.i4 6007 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 5999 ceq <null> brfalse IL_009C: nop call System.Void sNIGzJwCK.FqSidViXcWrVfxh::HzdoDjVyoXbxXh() ldc.i4 6003 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 5983 ceq <null> brfalse IL_00B1: nop nop <null> ldc.i4 5999 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 6014 ceq <null> brfalse IL_00C4: br IL_000B br IL_00C9: ret br IL_000B: nop ret <null>

Module Name

CrackLoader.exe

Full Name

CrackLoader.exe

EntryPoint

System.Void sNIGzJwCK.FqSidViXcWrVfxh::OYWmzsWKjtH(System.String[])

Scope Name

CrackLoader.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

CrackLoader

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

925

Main Method

System.Void sNIGzJwCK.FqSidViXcWrVfxh::OYWmzsWKjtH(System.String[])

Main IL Instruction Count

57

Main IL

ldc.i4 5983 stloc.0 <null> br IL_00C4: br IL_000B nop <null> ldloc.0 <null> ldc.i4 6007 ceq <null> brfalse IL_0024: nop call System.Void sNIGzJwCK.KWXcnahbVyYE::tooJCBmD() ldc.i4 6014 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 6003 ceq <null> brfalse IL_0083: nop newobj System.Void System.Random::.ctor() nop <null> ldc.r8 6000 ldc.r8 2000 call System.Double System.Math::Ceiling(System.Double) sub <null> call System.Int32 System.Convert::ToInt32(System.Double) nop <null> ldc.r8 6000.219189974283 ldc.r8 3000 call System.Double System.Math::Sin(System.Double) sub <null> call System.Int32 System.Convert::ToInt32(System.Double) callvirt System.Int32 System.Random::Next(System.Int32,System.Int32) call System.Void System.Threading.Thread::Sleep(System.Int32) ldc.i4 6007 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 5999 ceq <null> brfalse IL_009C: nop call System.Void sNIGzJwCK.FqSidViXcWrVfxh::HzdoDjVyoXbxXh() ldc.i4 6003 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 5983 ceq <null> brfalse IL_00B1: nop nop <null> ldc.i4 5999 stloc.0 <null> nop <null> ldloc.0 <null> ldc.i4 6014 ceq <null> brfalse IL_00C4: br IL_000B br IL_00C9: ret br IL_000B: nop ret <null>

c89d602844da0173a9f50b7e29727b00 (348.16 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
aiucpyhmphld
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙