Malicious
Malicious

cf81a51bd6f49cdbed622a922b7c33dd

PE Executable
|
MD5: cf81a51bd6f49cdbed622a922b7c33dd
|
Size: 133.12 KB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
cf81a51bd6f49cdbed622a922b7c33dd
Sha1
a25509536813a9b4acae984678ebc80b53500aaf
Sha256
d3c04371fa3aceeaf08182349f912d1a0265fbed122388391ac4b836fac88cdd
Sha384
445c831a89ff55610efd300883a532c5a44c47cb5f78343d375b884556402994e27d1b6ec97a42e6c17c05b557399005
Sha512
ccd67f2f144c02c97f88e2bd1b68d8d2fa5618e725fe67d810d7ff5f39affaf9c7f92367fea3ee671347f4dad8b97d67a7a2ea92cfc18cf7f13c8742b6eb37e6
SSDeep
1536:Mv1sHI9MEDyL11GbbhXgFAOG/pLzioVclN:MGHarDiLGbbhKAdleyY
TLSH
0FD33C0427C4C7B3EDD966BF9F53C203016F9BA613B18E096C80258E366AD8765D399F
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

YVZtZ2gzRzlOOERBelg0QjdPZlBVSzJsZk8yU1QxUU0=

Pastebin

-

Certificate

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

ServerSignature

Sq+mQcCT2aKthychDR6GJ9mHbRNDZoX9FjOS7jQz9teBsZDHxiUZ43EZ6+kjfmyuZ6Q2Fruq4fPOlCOpP8cJeqzlLyOagUah5Q+hAVkGoFh6VEHO5Mj+8iyspXiKjHjh0JsoKceTO5sDOIO8ddeAx2dP1dVGIQ0K

Install

true

BDOS

false

Anti-VM

true

Install File

login_google.exe

Install-Folder

%AppData%

Ports

88,443,8080,8848

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

login_mail.exe

Full Name

login_mail.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

login_mail.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

login_mail

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

YVZtZ2gzRzlOOERBelg0QjdPZlBVSzJsZk8yU1QxUU0=

Ports

88

Ports

443

Ports

8080

Ports

8848

Mutex

DcRatMutex_qwqda

cf81a51bd6f49cdbed622a922b7c33dd (133.12 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙