Suspicious
Suspect

e49f44de597fb593d010bcf6dea5a4ce

PE Executable
|
MD5: e49f44de597fb593d010bcf6dea5a4ce
|
Size: 207.87 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Very high

Hash
Hash Value
MD5
e49f44de597fb593d010bcf6dea5a4ce
Sha1
7cf2969109c2207b10559f9f4abbcbfd3a63a780
Sha256
278f6c04ddc26482fd33ee1035bbd970e6f517b554b22af03216b7d88cbf4335
Sha384
3519e68431e775df1b792038022e335a5e6d02b70a921032f68dccdb4e35fb767a6a186fd29de7814ac41b6a03a5065e
Sha512
3de89aa2c73ebe067a5a748630e5faed81f741d3472b21af1bcfb4cb0560496bb1443eb7eec3aada13ad6088ad75df307c51094ad5163d2e3eda77693ab3f86a
SSDeep
6144:MLV6Bta6dtJmakIM5zd4SJm9dsJz1ORHP:MLV6BtpmkydvzORHP
TLSH
F314CF252BB88A3FE2DE85B9612251139379C2E399C3F3DE28D454B74F267E10A071D7

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_RCDATA
ID:0001
ID:0
.Net Resources
ClientLoaderForm.resources
     ​     
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

NanoCore Client.exe

Full Name

NanoCore Client.exe

EntryPoint

System.Void ClientLoaderForm::Main()

Scope Name

NanoCore Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

NanoCore Client

Assembly Version

1.2.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Void ClientLoaderForm::Main()

Main IL Instruction Count

4

Main IL

call #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw== #=q_jQLaNdtSDa6ovA0VGw50w==::#=qqROT7DfncW7strhZvp0iRQ==() callvirt ClientLoaderForm #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw==::#=qbzig1$2CwLluEJt5uPtpgqPx5y_2S$GoPgJP36N8bTE=() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

NanoCore Client.exe

Full Name

NanoCore Client.exe

EntryPoint

System.Void ClientLoaderForm::Main()

Scope Name

NanoCore Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v2.0.50727

Tables Header Version

512

WinMD Version

<null>

Assembly Name

NanoCore Client

Assembly Version

1.2.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

2

Main Method

System.Void ClientLoaderForm::Main()

Main IL Instruction Count

4

Main IL

call #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw== #=q_jQLaNdtSDa6ovA0VGw50w==::#=qqROT7DfncW7strhZvp0iRQ==() callvirt ClientLoaderForm #=q_jQLaNdtSDa6ovA0VGw50w==/#=qlsj4Kl0M6SYgZMJLZ$QkSw==::#=qbzig1$2CwLluEJt5uPtpgqPx5y_2S$GoPgJP36N8bTE=() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

e49f44de597fb593d010bcf6dea5a4ce (207.87 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_RCDATA
ID:0001
ID:0
.Net Resources
ClientLoaderForm.resources
     ​     
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙