Suspicious
Suspect

d3bb9512e272f22ed7e685e9f78f44ba

PE Executable
|
MD5: d3bb9512e272f22ed7e685e9f78f44ba
|
Size: 3.42 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
d3bb9512e272f22ed7e685e9f78f44ba
Sha1
3c0323a96c199fcca8225cc467e9421cba12ac78
Sha256
7e9868f4da3238a549866769de126d9ef902b19c4760701d8f883f54bf8961c0
Sha384
269054aeb804424415cd2e9ea3343881f073f6a6ef023aa5ee95d7248ff528d59663b4ace668c7d2e2c9b560a92625cf
Sha512
66dc13b1120a80f719ad941f5c22252a1ee20ee4a41147c8e423884811cea7f1cdae7e1c48a91d3c0adcbbff6f57bd88c3c4e905c77771683e450070c5e22aa2
SSDeep
98304:i6Kgf3HGZO1S5MKVBbwhpW2ywHNd2/G/5R:zKg/H82Sa0BbMkAHvL7
TLSH
14F522D8324079AEC857CC3195641D74A2536E6A3F0FF243AD137D6BBA3F8DA9E14092

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‮‌‫‪‭‏‏‍‫‭‭‪‭‎‏‭‪‍‭‫‭‪‮()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

2.2.0.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

7

Main Method

System.Void ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‮‌‫‪‭‏‏‍‫‭‭‪‭‎‏‭‪‍‭‫‭‪‮()

Main IL Instruction Count

49

Main IL

nop <null> call System.String ‮‫‫‍‍‌‍‏‭‫‌‍‪‏‬‎‫‭‬‌​‍‪‏‮::‏‍‌‮‍‫‫​‫‌‪‮‪‮‮‭‪​​‭‏‬‌‬‌‮() ldc.i4 1338407944 call System.String <Module>::‬‍‭‬​‍‭‫‌​‎‍‭‏​‮‪‍‌‌‮‎​‮‮‭‫‮<System.String>(System.UInt32) call System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‭‎‫‎‪‌‌‪‪‪‍‫‎​‎‮‍​‏‬‎‍‮(System.String,System.String) stsfld System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‍‌‬‍‏‪‍‮‍‫‮​‎‏​‎‏‬‏​‌‬‌‮‍‮ ldsfld System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‍‌‬‍‏‪‍‮‍‫‮​‎‏​‎‏‬‏​‌‬‌‮‍‮ call System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‏‍‪‍‭‬‫‪‏‍‏‍‍​‌‎‫‪‫‌‫‬‬‮(System.String) stsfld System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‌‫‬‮‪‭‮‍‫‫‍‭‪‮‫​‪‮​‌‬‌‮​‌‌‫‮ newobj System.Void ‌‮‍‫‫‌‏‌‬‭​‮‍‭‍‌‬‍‫‎​‌‬​‌​‍‭​‫‮::.ctor() stloc.0 <null> ldc.i4 -1038792613 ldc.i4 -2034147696 xor <null> dup <null> stloc.2 <null> ldc.i4.4 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_00AF: ret ldloc.0 <null> ldsfld System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‌‫‬‮‪‭‮‍‫‫‍‭‪‮‫​‪‮​‌‬‌‮​‌‌‫‮ call System.Diagnostics.Process ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::​‌‍‪‪‪‪‍‌‎‫‭‮‍‪‫‫‪​‏‪‍‮‎‎‌‌‮() call System.Diagnostics.ProcessModule ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‬‎‍‪‪‎‏‌‬‮‏‍‪‫‫‎‬‏‪‌​‫‌‫‏‮‬‮(System.Diagnostics.Process) call System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‌‏‌‌​‎‫‮‍‍‫‭​‪‬‫‍‌‎‬‮‪‏‍‮​‪‮(System.Diagnostics.ProcessModule) callvirt System.Boolean ‌‮‍‫‫‌‏‌‬‭​‮‍‭‍‌‬‍‫‎​‌‬​‌​‍‭​‫‮::‏‍‍‏‬‌‫‌‎‫‫‮​‍‌‌​‎‮‫‎‏​‌‏‭‬‮(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 291437614 mul <null> ldc.i4 213823970 xor <null> br.s IL_0034: ldc.i4 -2034147696 newobj System.Void ‌‍‮‍‬‪‍‭‏‮‭​‪‪‪‫​​‫‏​‍​‏‭‪‮::.ctor() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‌‫‬‮‪‭‮‍‫‫‍‭‪‮‫​‪‮​‌‬‌‮​‌‌‫‮ call System.Diagnostics.Process ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::​‌‍‪‪‪‪‍‌‎‫‭‮‍‪‫‫‪​‏‪‍‮‎‎‌‌‮() call System.Diagnostics.ProcessModule ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‬‎‍‪‪‎‏‌‬‮‏‍‪‫‫‎‬‏‪‌​‫‌‫‏‮‬‮(System.Diagnostics.Process) call System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‌‏‌‌​‎‫‮‍‍‫‭​‪‬‫‍‌‎‬‮‪‏‍‮​‪‮(System.Diagnostics.ProcessModule) callvirt System.Boolean ‌‍‮‍‬‪‍‭‏‮‭​‪‪‪‫​​‫‏​‍​‏‭‪‮::‪‏‏‭​‮​‭‮‎‭‬‪‏‌‍‪‮‭‪‪‬‪​‮(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 550708118 mul <null> ldc.i4 -1305593219 xor <null> br.s IL_0034: ldc.i4 -2034147696 ret <null>

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‮‌‫‪‭‏‏‍‫‭‭‪‭‎‏‭‪‍‭‫‭‪‮()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

2.2.0.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

7

Main Method

System.Void ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‮‌‫‪‭‏‏‍‫‭‭‪‭‎‏‭‪‍‭‫‭‪‮()

Main IL Instruction Count

49

Main IL

nop <null> call System.String ‮‫‫‍‍‌‍‏‭‫‌‍‪‏‬‎‫‭‬‌​‍‪‏‮::‏‍‌‮‍‫‫​‫‌‪‮‪‮‮‭‪​​‭‏‬‌‬‌‮() ldc.i4 1338407944 call System.String <Module>::‬‍‭‬​‍‭‫‌​‎‍‭‏​‮‪‍‌‌‮‎​‮‮‭‫‮<System.String>(System.UInt32) call System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‭‎‫‎‪‌‌‪‪‪‍‫‎​‎‮‍​‏‬‎‍‮(System.String,System.String) stsfld System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‍‌‬‍‏‪‍‮‍‫‮​‎‏​‎‏‬‏​‌‬‌‮‍‮ ldsfld System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‍‌‬‍‏‪‍‮‍‫‮​‎‏​‎‏‬‏​‌‬‌‮‍‮ call System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‏‍‪‍‭‬‫‪‏‍‏‍‍​‌‎‫‪‫‌‫‬‬‮(System.String) stsfld System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‌‫‬‮‪‭‮‍‫‫‍‭‪‮‫​‪‮​‌‬‌‮​‌‌‫‮ newobj System.Void ‌‮‍‫‫‌‏‌‬‭​‮‍‭‍‌‬‍‫‎​‌‬​‌​‍‭​‫‮::.ctor() stloc.0 <null> ldc.i4 -1038792613 ldc.i4 -2034147696 xor <null> dup <null> stloc.2 <null> ldc.i4.4 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_00AF: ret ldloc.0 <null> ldsfld System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‌‫‬‮‪‭‮‍‫‫‍‭‪‮‫​‪‮​‌‬‌‮​‌‌‫‮ call System.Diagnostics.Process ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::​‌‍‪‪‪‪‍‌‎‫‭‮‍‪‫‫‪​‏‪‍‮‎‎‌‌‮() call System.Diagnostics.ProcessModule ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‬‎‍‪‪‎‏‌‬‮‏‍‪‫‫‎‬‏‪‌​‫‌‫‏‮‬‮(System.Diagnostics.Process) call System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‌‏‌‌​‎‫‮‍‍‫‭​‪‬‫‍‌‎‬‮‪‏‍‮​‪‮(System.Diagnostics.ProcessModule) callvirt System.Boolean ‌‮‍‫‫‌‏‌‬‭​‮‍‭‍‌‬‍‫‎​‌‬​‌​‍‭​‫‮::‏‍‍‏‬‌‫‌‎‫‫‮​‍‌‌​‎‮‫‎‏​‌‏‭‬‮(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 291437614 mul <null> ldc.i4 213823970 xor <null> br.s IL_0034: ldc.i4 -2034147696 newobj System.Void ‌‍‮‍‬‪‍‭‏‮‭​‪‪‪‫​​‫‏​‍​‏‭‪‮::.ctor() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‌‫‬‮‪‭‮‍‫‫‍‭‪‮‫​‪‮​‌‬‌‮​‌‌‫‮ call System.Diagnostics.Process ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::​‌‍‪‪‪‪‍‌‎‫‭‮‍‪‫‫‪​‏‪‍‮‎‎‌‌‮() call System.Diagnostics.ProcessModule ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‬‎‍‪‪‎‏‌‬‮‏‍‪‫‫‎‬‏‪‌​‫‌‫‏‮‬‮(System.Diagnostics.Process) call System.String ‬‍‭‏​‏‭​‌‌‎‍‌‌‪‌‌‪‍‮‍‮‏‌‭‮::‎‌‏‌‌​‎‫‮‍‍‫‭​‪‬‫‍‌‎‬‮‪‏‍‮​‪‮(System.Diagnostics.ProcessModule) callvirt System.Boolean ‌‍‮‍‬‪‍‭‏‮‭​‪‪‪‫​​‫‏​‍​‏‭‪‮::‪‏‏‭​‮​‭‮‎‭‬‪‏‌‍‪‮‭‪‪‬‪​‮(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 550708118 mul <null> ldc.i4 -1305593219 xor <null> br.s IL_0034: ldc.i4 -2034147696 ret <null>

d3bb9512e272f22ed7e685e9f78f44ba (3.42 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙