|
Hash | Hash Value |
|---|---|
| MD5 | dcbab6425d2251467b58f7366d91661f
|
| Sha1 | d30cd8e7359ceb0591f99ee97c77e728ccbe188c
|
| Sha256 | 6123c6c12666929b8b06a3b9e62939dc11a9bc5b1a52b6d1cf645c71736aee65
|
| Sha384 | a4619c70b76967757a7a3687a4799886a816f7e0c145219ba30d68d63860365f4594e4e38d8811ee7e299476f5579dfb
|
| Sha512 | f7e4113b24a940ab574f113fdaa88ca0e7030bd5bef23a3683b38524d65af01f174f286e35d086ad83fdf8fb4b007c86ae97790148f46b4b237efda516026e56
|
| SSDeep | 12288:XMcjA/VYbLEiv9w/mBtLN+wEIkiq+sIkTpB8LQ:XMcgynEseyEwWD3pB8LQ
|
| TLSH | FDF46C4033E8D65BE5AE1775E4B0092507F5E107BA62FB9F4A40B1F93C63B826D817A3
|
PeID
|
Config. Field0 | Value |
|---|---|
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Conf. AES-Key | D2973F3069489602440049C54C37809627555190 |
| Version | 1.7.1 |
| Port | YovngMandaYNoTu-43886.portmap.ho |
| Host | YovngMandaYNoTu-43886.portmap.ho |
| ReconnectDelay | 3000 |
| Key | SubDir |
| SubDirectory | Client.exe |
| InstallName | 0 |
| Install | 0 |
| Startup | f1856190-4737-4006-8a08-1cae73fe |
| Mutex | Quasar Modded Cl |
| StartupKey | 0 |
| HideFile | 0 |
| EnableLogger | victims01 |
| EncryptionKey | Logs |
|
Config. Field0 | Value |
|---|---|
| Key (AES_256) | - |
| Pastebin | - |
| ServerSignature | fIPDA/HBP4hzBjUAyqNOO2Qy4g0nujq5fHwaURzwR+udfD7afG4JVzfqOZW1CoxTymSe5zg3vOACmSZs3BEJ4jE+HQQt5kyd5YvYbpwYEMoBbQuLVrux3IH9w1FX1ZTo |
| Install File | SbieDll.dll |
| Mutex | cmdvrt32.dll |
| Group | cmdvrt64.dll |
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader FAIL, AsmResolver Mapped OK |
| Info | Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_e0699fa9.exe |
| Module Name | Client |
| Full Name | Client |
| EntryPoint | System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::Main(System.String[]) |
| Scope Name | Client |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Client |
| Assembly Version | 1.7.1.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.8 |
| Total Strings | 1957 |
| Main Method | System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::Main(System.String[]) |
| Main IL Instruction Count | 20 |
| Main IL | ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4.2 <null> call System.Void System.Windows.Forms.Application::SetUnhandledExceptionMode(System.Windows.Forms.UnhandledExceptionMode) ldnull <null> ldftn System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::䘏뒼핵慘톢䆫嵏籴罅ᦤ篐좔ࡰ暗䲌ᱽⱓ驆螷奈(System.Object,System.Threading.ThreadExceptionEventArgs) newobj System.Void System.Threading.ThreadExceptionEventHandler::.ctor(System.Object,System.IntPtr) call System.Void System.Windows.Forms.Application::add_ThreadException(System.Threading.ThreadExceptionEventHandler) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::㒸춖쇤锍궣籈λ苺쁩뺰㢁쓈啿㗾ዬ곺킨卙跃(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::령㝯곂蒜騲ᰠꄕ總癝᰽蓻훞꽂ꇯ改ṧ() newobj System.Void yhmrkitgwiwmffbmaorv.ﴯ䒞ꑇ軨괸脁㌪뽊⬌≳䀑옣諿淒擤㳲::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> |
| Module Name | Client |
| Full Name | Client |
| EntryPoint | System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::Main(System.String[]) |
| Scope Name | Client |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Client |
| Assembly Version | 1.7.1.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.8 |
| Total Strings | 1957 |
| Main Method | System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::Main(System.String[]) |
| Main IL Instruction Count | 20 |
| Main IL | ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4.2 <null> call System.Void System.Windows.Forms.Application::SetUnhandledExceptionMode(System.Windows.Forms.UnhandledExceptionMode) ldnull <null> ldftn System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::䘏뒼핵慘톢䆫嵏籴罅ᦤ篐좔ࡰ暗䲌ᱽⱓ驆螷奈(System.Object,System.Threading.ThreadExceptionEventArgs) newobj System.Void System.Threading.ThreadExceptionEventHandler::.ctor(System.Object,System.IntPtr) call System.Void System.Windows.Forms.Application::add_ThreadException(System.Threading.ThreadExceptionEventHandler) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::㒸춖쇤锍궣籈λ苺쁩뺰㢁쓈啿㗾ዬ곺킨卙跃(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.Void yhmrkitgwiwmffbmaorv.ヂ賣֭䢷㝾ᅲώ몇嗠㠦㖡ˆꯤ湩숿䦯::령㝯곂蒜騲ᰠꄕ總癝᰽蓻훞꽂ꇯ改ṧ() newobj System.Void yhmrkitgwiwmffbmaorv.ﴯ䒞ꑇ軨괸脁㌪뽊⬌≳䀑옣諿淒擤㳲::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> |
|
Name0 | Value |
|---|---|
| CnC | YovngMandaYNoTu-43886.portmap.ho |
| Port | YovngMandaYNoTu-43886.portmap.ho |
| Key (AES_256) | - |
| Mutex | cmdvrt32.dll |
| PE Layout | MemoryMapped (process dump suspected) |
| CnC | YovngMandaYNoTu-43886.portmap.ho |
| Port | YovngMandaYNoTu-43886.portmap.ho |
| Key (AES_256) | - |
| Mutex | cmdvrt32.dll |
| PE Layout | MemoryMapped (process dump suspected) |
|
Config. Field0 | Value |
|---|---|
| Conf. AES-Salt | BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41 |
| Conf. AES-Key | D2973F3069489602440049C54C37809627555190 |
| Version | 1.7.1 |
| Port | YovngMandaYNoTu-43886.portmap.ho |
| Host | YovngMandaYNoTu-43886.portmap.ho |
| ReconnectDelay | 3000 |
| Key | SubDir |
| SubDirectory | Client.exe |
| InstallName | 0 |
| Install | 0 |
| Startup | f1856190-4737-4006-8a08-1cae73fe |
| Mutex | Quasar Modded Cl |
| StartupKey | 0 |
| HideFile | 0 |
| EnableLogger | victims01 |
| EncryptionKey | Logs |
|
Config. Field0 | Value |
|---|---|
| Key (AES_256) | - |
| Pastebin | - |
| ServerSignature | fIPDA/HBP4hzBjUAyqNOO2Qy4g0nujq5fHwaURzwR+udfD7afG4JVzfqOZW1CoxTymSe5zg3vOACmSZs3BEJ4jE+HQQt5kyd5YvYbpwYEMoBbQuLVrux3IH9w1FX1ZTo |
| Install File | SbieDll.dll |
| Mutex | cmdvrt32.dll |
| Group | cmdvrt64.dll |
|
Name0 | Value | Location |
|---|---|---|
| CnC | YovngMandaYNoTu-43886.portmap.ho Malicious |
dcbab6425d2251467b58f7366d91661f |
| Port | YovngMandaYNoTu-43886.portmap.ho Malicious |
dcbab6425d2251467b58f7366d91661f |
| Key (AES_256) | - Malicious |
dcbab6425d2251467b58f7366d91661f |
| Mutex | cmdvrt32.dll Malicious |
dcbab6425d2251467b58f7366d91661f |
| PE Layout | MemoryMapped (process dump suspected) |
dcbab6425d2251467b58f7366d91661f |
| CnC | YovngMandaYNoTu-43886.portmap.ho Malicious |
dcbab6425d2251467b58f7366d91661f > [Rebuild from dump]_e0699fa9.exe |
| Port | YovngMandaYNoTu-43886.portmap.ho Malicious |
dcbab6425d2251467b58f7366d91661f > [Rebuild from dump]_e0699fa9.exe |
| Key (AES_256) | - Malicious |
dcbab6425d2251467b58f7366d91661f > [Rebuild from dump]_e0699fa9.exe |
| Mutex | cmdvrt32.dll Malicious |
dcbab6425d2251467b58f7366d91661f > [Rebuild from dump]_e0699fa9.exe |
| PE Layout | MemoryMapped (process dump suspected) |
dcbab6425d2251467b58f7366d91661f > [Rebuild from dump]_e0699fa9.exe |