Suspicious
Suspect

e5a52361d793dc5c0223d3f98279d362

PE Executable
|
MD5: e5a52361d793dc5c0223d3f98279d362
|
Size: 2.28 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
e5a52361d793dc5c0223d3f98279d362
Sha1
3546b7d38695289333d053a0448e618dda993700
Sha256
f7a72e7cf98d0c0d7c58af1662b0e1724ba344e9089a12d3437de02520e63a3a
Sha384
bc641dd6b950890652815385f3d215be1a3083f1bc6ad5144dac20dafcc37b7a4f683d0a3f87529fa8503b4c3ee1b14a
Sha512
ee3b7273335a731c50635ed5d99093875c05f36d84c43d801422ac73d51438ec343c48d409fd4ef5e78a9fb08e27ba4ddf4350f3385b4adacf92776fb3ea5cde
SSDeep
24576:TUrsSWeWBRYRR1qJ10m8yXP8oc5R2NntxO0KKSb7yviUSQaBaOwIRxl2S62/90yP:4y7YRnirm2NnPlKKSb7L3wip6MaRFEr
TLSH
68B5BF203DEB401AF1B7AF75DAD074DA9B7EF223670A965E145503460E23A41EEC723E

PeID

.NET executable
HQR data file
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void jibwynmkfkdxzfscoo.dAj78gmJPu1x::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.6.5.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

4557

Main Method

System.Void jibwynmkfkdxzfscoo.dAj78gmJPu1x::Main()

Main IL Instruction Count

11

Main IL

ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4.2 <null> call System.Void System.Windows.Forms.Application::SetUnhandledExceptionMode(System.Windows.Forms.UnhandledExceptionMode) call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.Void jibwynmkfkdxzfscoo.dAj78gmJPu1x::OCI8lDc1hTn5NmhTIry() newobj System.Void jibwynmkfkdxzfscoo.Oh2McWBNwvX::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void jibwynmkfkdxzfscoo.dAj78gmJPu1x::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.6.5.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

4557

Main Method

System.Void jibwynmkfkdxzfscoo.dAj78gmJPu1x::Main()

Main IL Instruction Count

11

Main IL

ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4.2 <null> call System.Void System.Windows.Forms.Application::SetUnhandledExceptionMode(System.Windows.Forms.UnhandledExceptionMode) call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.Void jibwynmkfkdxzfscoo.dAj78gmJPu1x::OCI8lDc1hTn5NmhTIry() newobj System.Void jibwynmkfkdxzfscoo.Oh2McWBNwvX::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
Embedded Resources

31

Suspicious Type Names (1-2 chars)

0

e5a52361d793dc5c0223d3f98279d362 (2.28 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

31

e5a52361d793dc5c0223d3f98279d362

Suspicious Type Names (1-2 chars)

0

e5a52361d793dc5c0223d3f98279d362

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙