Suspicious
Suspect

dcfb0a3b24c3c469c4c205ddf2ccd3af

PE Executable
|
MD5: dcfb0a3b24c3c469c4c205ddf2ccd3af
|
Size: 25.95 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
dcfb0a3b24c3c469c4c205ddf2ccd3af
Sha1
a4a2cff87fbf567768eecb1ce3a3c939937be136
Sha256
3e617b7cf7f9d6e1bb8fdd06ef64a6e6aec20132549884fafbbd5bb6118c9a7c
Sha384
8be6a70516cb344f4a711ea6d97ce703c58ae050cf38eea00a60172662335389e3608f3524de4a5af3a4e2cf9af442bb
Sha512
b089411899c9160dc9d1e4b0a221dd93f5b00fa78b2b6b84e8771eb3fb68ec36c970716cff14d6e8a4d21803394119c6424b893168be409eed6b800643a263fa
SSDeep
384:sv3ZIvmA2jReogaUPZCGJsdDVcp0F9h2HbmdPvo8I6CQsJfIFgjEZhmHG:svpvA2jkDc/d6pwgwvj1CDgFjhmm
TLSH
71C2D104914AC3F6C47A4BB24757431271A5E31718971A7C4DAC8DABBBE3BEE0E917C4

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Int32 mpress._::Main(System.String[])

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Int32 mpress._::Main(System.String[])

Main IL Instruction Count

75

Main IL

nop <null> call System.String System.Windows.Forms.Application::get_ExecutablePath() ldloca.s V_0 call System.Boolean mpress._::lf(System.String,System.Byte[]&) stloc.s V_6 ldloc.s V_6 brtrue.s IL_0029: nop nop <null> ldstr File is invalid. ldstr MPRESS call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldc.i4.m1 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 nop <null> ldloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stsfld System.Reflection.Assembly mpress._::mp ldsfld System.Reflection.Assembly mpress._::mp callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.1 <null> ldnull <null> stloc.3 <null> ldloc.1 <null> callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> ldc.i4.0 <null> cgt <null> ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0066: ldloc.1 ldc.i4.1 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_7 stloc.3 <null> ldloc.1 <null> ldnull <null> ldloc.3 <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_4 ldloc.s V_4 ldnull <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0085: ldc.i4.0 ldloc.s V_4 unbox.any System.Int32 stloc.2 <null> br.s IL_0087: nop ldc.i4.0 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop pop <null> nop <null> ldc.i4.m1 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop nop <null> ldloc.2 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 ldloc.s V_5 ret <null>

Module Name

Stub.exe

Full Name

Stub.exe

EntryPoint

System.Int32 mpress._::Main(System.String[])

Scope Name

Stub.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Stub

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Int32 mpress._::Main(System.String[])

Main IL Instruction Count

75

Main IL

nop <null> call System.String System.Windows.Forms.Application::get_ExecutablePath() ldloca.s V_0 call System.Boolean mpress._::lf(System.String,System.Byte[]&) stloc.s V_6 ldloc.s V_6 brtrue.s IL_0029: nop nop <null> ldstr File is invalid. ldstr MPRESS call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldc.i4.m1 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 nop <null> ldloc.0 <null> call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) stsfld System.Reflection.Assembly mpress._::mp ldsfld System.Reflection.Assembly mpress._::mp callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.1 <null> ldnull <null> stloc.3 <null> ldloc.1 <null> callvirt System.Reflection.ParameterInfo[] System.Reflection.MethodBase::GetParameters() ldlen <null> conv.i4 <null> ldc.i4.0 <null> cgt <null> ldc.i4.0 <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0066: ldloc.1 ldc.i4.1 <null> newarr System.Object stloc.s V_7 ldloc.s V_7 ldc.i4.0 <null> ldarg.0 <null> stelem.ref <null> ldloc.s V_7 stloc.3 <null> ldloc.1 <null> ldnull <null> ldloc.3 <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) stloc.s V_4 ldloc.s V_4 ldnull <null> ceq <null> stloc.s V_6 ldloc.s V_6 brtrue.s IL_0085: ldc.i4.0 ldloc.s V_4 unbox.any System.Int32 stloc.2 <null> br.s IL_0087: nop ldc.i4.0 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop pop <null> nop <null> ldc.i4.m1 <null> stloc.2 <null> nop <null> leave.s IL_0091: nop nop <null> ldloc.2 <null> stloc.s V_5 br.s IL_0097: ldloc.s V_5 ldloc.s V_5 ret <null>

Artefacts
Name
Value
Embedded Resources

0

Suspicious Type Names (1-2 chars)

0

dcfb0a3b24c3c469c4c205ddf2ccd3af (25.95 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

0

dcfb0a3b24c3c469c4c205ddf2ccd3af

Suspicious Type Names (1-2 chars)

0

dcfb0a3b24c3c469c4c205ddf2ccd3af

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙