Suspicious
Suspect

dcd9c7ece0e0044fc5b3613a1f5598e7

PE Executable
|
MD5: dcd9c7ece0e0044fc5b3613a1f5598e7
|
Size: 6.59 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
dcd9c7ece0e0044fc5b3613a1f5598e7
Sha1
054c05c74f2b1506e496f410adf16dd0b19347d8
Sha256
1c28d30ab1ce4eb57e0e49395d86bd5641b732066af777296be3aac2e11a06cc
Sha384
eebe1b4b0022249ab6938e01587e1ab38ba0ecd77d58032a427457a4ebb58c9f4af6050ef4ad0c41278394c8c07d10ae
Sha512
66cf4cea239f23893ee049292673f984141794d6baf1bf207ad47e65e20361a3672db2264d420ce7dadef7233064f6f3754bedf3d1f8c14ccb627049724478d0
SSDeep
196608:pE8DdyJSwk1D6DQNTz9AsAX/lclkTTw/IcWlAn:y8JL6D8xPAXNXTc/II
TLSH
B86633DB096F7868F2BB9AFC75E2B7C84145865E036974BCB2A5F354B2CC8D60796003

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
nuikjetfin.Resources
Moy.exe
Valerika.exe
Informations
Name
Value
Module Name

Nursultan.exe

Full Name

Nursultan.exe

EntryPoint

System.Void Program::Main()

Scope Name

Nursultan.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Nursultan

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

23

Main Method

System.Void Program::Main()

Main IL Instruction Count

57

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: call System.Boolean Program::DetectVirtualMachine() call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Boolean Program::DetectVirtualMachine() call System.Boolean Program::Emulator() or <null> call System.Boolean Program::DetectDebugger() or <null> call System.Boolean Program::DetectSandboxie() or <null> call System.Boolean Program::anyrun() or <null> brfalse.s IL_0040: leave.s IL_0050 ldnull <null> call System.Void System.Environment::FailFast(System.String) leave.s IL_0050: call System.Boolean Program::AdminCheck() dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.0 <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_0050: call System.Boolean Program::AdminCheck() call System.Boolean Program::AdminCheck() brtrue.s IL_00B1: ldnull newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() stloc.1 <null> ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::GetCurrentProcess() callvirt System.Diagnostics.ProcessModule System.Diagnostics.Process::get_MainModule() callvirt System.String System.Diagnostics.ProcessModule::get_FileName() callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) ldloc.1 <null> ldstr runas callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Verb(System.String) ldloc.1 <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) leave.s IL_00AF: br.s IL_00B8 dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.2 <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_00AF: br.s IL_00B8 br.s IL_00B8: ret ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

Module Name

Nursultan.exe

Full Name

Nursultan.exe

EntryPoint

System.Void Program::Main()

Scope Name

Nursultan.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Nursultan

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

23

Main Method

System.Void Program::Main()

Main IL Instruction Count

57

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: call System.Boolean Program::DetectVirtualMachine() call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Boolean Program::DetectVirtualMachine() call System.Boolean Program::Emulator() or <null> call System.Boolean Program::DetectDebugger() or <null> call System.Boolean Program::DetectSandboxie() or <null> call System.Boolean Program::anyrun() or <null> brfalse.s IL_0040: leave.s IL_0050 ldnull <null> call System.Void System.Environment::FailFast(System.String) leave.s IL_0050: call System.Boolean Program::AdminCheck() dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.0 <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_0050: call System.Boolean Program::AdminCheck() call System.Boolean Program::AdminCheck() brtrue.s IL_00B1: ldnull newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() stloc.1 <null> ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::GetCurrentProcess() callvirt System.Diagnostics.ProcessModule System.Diagnostics.Process::get_MainModule() callvirt System.String System.Diagnostics.ProcessModule::get_FileName() callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) ldloc.1 <null> ldstr runas callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Verb(System.String) ldloc.1 <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) leave.s IL_00AF: br.s IL_00B8 dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.2 <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_00AF: br.s IL_00B8 br.s IL_00B8: ret ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

dcd9c7ece0e0044fc5b3613a1f5598e7 (6.59 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
nuikjetfin.Resources
Moy.exe
Valerika.exe
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙