Malicious
Malicious

d8d6d91e09709cee2e18625699ec602e

PE Executable
|
MD5: d8d6d91e09709cee2e18625699ec602e
|
Size: 65.02 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
d8d6d91e09709cee2e18625699ec602e
Sha1
ca0f772b2c550dd65c152ed01adb29264104e260
Sha256
7d7db8dde2d6ebc5edbb5284336a3dd99f75e86952ba616f7d693d9a221c4b4d
Sha384
c4cee04e42654549dc3015bb2e21584c5b5ff164db06056d08951f8f845698548c411e6bea6f1010b14589251c891fec
Sha512
6b134d23b501864c03e215cee5c4d99b48a2c5a68eb785f2ee84673701efda01dcf363e2eacc382df3dc65047dca7d89179b0d14f65e23e28c33d4b0a2a155de
SSDeep
1536:2hjExLDRwQuNMXbmaeWs1lO9OQUeGBbUw0YlCGxAVclN:2hjExLDRwQuNMXbreFlO9fLGBbUwl/6Y
TLSH
04536C042798C925E1AD4AF8ACF2554146B5D6772106DB1E7CC404CBAB9FFCA4A233FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ODZwZzVFUzM0SjFCZ1VqU0VldDRsaDkwMWp6cGlvWFM=

Pastebin

-

Certificate

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

ServerSignature

JVH3l8DPjD34vQa9AMljftdzUUm1gKNaJRzBovVF5ffWiMI3MIbixxy1LHSAhPusFlfV6ydwi43URmmG0PwUIc4zlLWQ+EU6vrjPz9S3lZrjcQ9frifeNhynwIOS7SKbNSV8k8n2bjDlAYSCYZpDrdicGnZw2ba9

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Hosts

48.209.82.191

Ports

1337

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

hele.exe

Full Name

hele.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

hele.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

hele

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

hele.exe

Full Name

hele.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

hele.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

hele

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

ODZwZzVFUzM0SjFCZ1VqU0VldDRsaDkwMWp6cGlvWFM=

CnC

48.209.82.191

Ports

1337

Mutex

DcRatMutex_qwqda

d8d6d91e09709cee2e18625699ec602e (65.02 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ODZwZzVFUzM0SjFCZ1VqU0VldDRsaDkwMWp6cGlvWFM=

Pastebin

-

Certificate

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

ServerSignature

JVH3l8DPjD34vQa9AMljftdzUUm1gKNaJRzBovVF5ffWiMI3MIbixxy1LHSAhPusFlfV6ydwi43URmmG0PwUIc4zlLWQ+EU6vrjPz9S3lZrjcQ9frifeNhynwIOS7SKbNSV8k8n2bjDlAYSCYZpDrdicGnZw2ba9

Install

false

BDOS

false

Anti-VM

false

Install-Folder

%AppData%

Hosts

48.209.82.191

Ports

1337

Mutex

DcRatMutex_qwqda

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

ODZwZzVFUzM0SjFCZ1VqU0VldDRsaDkwMWp6cGlvWFM=

Malicious

d8d6d91e09709cee2e18625699ec602e

CnC

48.209.82.191

Malicious

d8d6d91e09709cee2e18625699ec602e

Ports

1337

Malicious

d8d6d91e09709cee2e18625699ec602e

Mutex

DcRatMutex_qwqda

Malicious

d8d6d91e09709cee2e18625699ec602e

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙