Malicious
Malicious

e63a4a456c41bc3e1205317447636e89

PE Executable
|
MD5: e63a4a456c41bc3e1205317447636e89
|
Size: 65.02 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
e63a4a456c41bc3e1205317447636e89
Sha1
0ac98779b41b0877f56f92acdf1d399962adc0f6
Sha256
7107a5aff83a129d0a58e09a5338be703a9ded881cd7d750cbccb2e255898a34
Sha384
4a23bd619478efdfa8d2d8bea79fc831a3844ac74f4693bc526601e3246554283d2cb8026bf76a4556b969bd5bc42c02
Sha512
c9c10daaa3aae9dd709039ab211bbad8a4ff12772d7ae3fab068947f7c6403501a753cc8965afc16c13ee0b8470a0315026b7d76fffbddc8e59954ac3666ddfe
SSDeep
1536:CQBmhYLs9kneNUUX5yh94Gbb0wrEsjGlZVclN:CQ/Ls9kneNUUX5yoGbb0IyzY
TLSH
19535B002788CA65E2BD4AF8BCF2950046B5D5732102DB5E7CC414DBAB9FFC64A132EE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

Q0s2OTRNd3JiNlJ4Z1l3am5TWm5jTnpFT3EyNTVUaVk=

Pastebin

-

Certificate

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

ServerSignature

Gl8mwUZdkKktSYX5UEmpkY/udHb6YAqSbEPt2YtXbTPwYURXW0eI0875iNzWqvSK9N6IyJcMglBPru61zJCGp+UVA/Z8GUnMF3Gey4aq9iKWfuGSRO9tOZ8A0GOwc2blNSe2LPpfFOVYrNr+GU3GWsGbD8s/rexGKncrJvEO1yI=

Install

false

BDOS

false

Anti-VM

false

Install File

chrome_updater.exe

Install-Folder

%AppData%

Hosts

91clubgamez.com,malware.91clubgamez.com

Ports

1604,4782,8080,8848,8888,9527

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

chrome_updater.exe

Full Name

chrome_updater.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

chrome_updater.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

chrome_updater

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

chrome_updater.exe

Full Name

chrome_updater.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

chrome_updater.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

chrome_updater

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

Q0s2OTRNd3JiNlJ4Z1l3am5TWm5jTnpFT3EyNTVUaVk=

CnC

91clubgamez.com

CnC

malware.91clubgamez.com

Ports

1604

Ports

4782

Ports

8080

Ports

8848

Ports

8888

Ports

9527

Mutex

DcRatMutex_qwqdanchun

e63a4a456c41bc3e1205317447636e89 (65.02 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

Q0s2OTRNd3JiNlJ4Z1l3am5TWm5jTnpFT3EyNTVUaVk=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVALwMU60zTAb4aaPDtkq1JFjKtBcBMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDIyODAzMzM0MFoXDTM1MTIwODAzMzM0MFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMikQajmQ0zy3KIHgODFq97Qs7DICB3Jt9vekYVaFPUE3poPM0HdVHEmVIQEHjw+IbgS9304/ILCDrJKO4qfh0sDLXiqa4PeUl+ImgeAgkygWTaFMpE/8iD3lW7QRBD0f3k54vGyeeNizDNKtdTOV+Y9IGhr/nIo3XFF8pLqzBMTAgMBAAGjMjAwMB0GA1UdDgQWBBTaZcoGsqh4yIhJ6ZkUvJHN28GXhjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAHh7DY1mTiBqiQQ0sBZGW3ePvOiR55btk/D7NSUXunDm7pzg2TNYbVaM4B5QR8TK4+LSEVTjf1Muj0KD8QKMV/jHZlMUTeWS8OL7l9UUCHSf/a33OLnhowMwoH6ZI9Qq29urkh2vZoFwb+ey3OXAr/5QdJGmFY0sL/qPebaPsD/N

ServerSignature

Gl8mwUZdkKktSYX5UEmpkY/udHb6YAqSbEPt2YtXbTPwYURXW0eI0875iNzWqvSK9N6IyJcMglBPru61zJCGp+UVA/Z8GUnMF3Gey4aq9iKWfuGSRO9tOZ8A0GOwc2blNSe2LPpfFOVYrNr+GU3GWsGbD8s/rexGKncrJvEO1yI=

Install

false

BDOS

false

Anti-VM

false

Install File

chrome_updater.exe

Install-Folder

%AppData%

Hosts

91clubgamez.com,malware.91clubgamez.com

Ports

1604,4782,8080,8848,8888,9527

Mutex

DcRatMutex_qwqdanchun

Version

1.0.7

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

Q0s2OTRNd3JiNlJ4Z1l3am5TWm5jTnpFT3EyNTVUaVk=

Malicious

e63a4a456c41bc3e1205317447636e89

CnC

91clubgamez.com

Malicious

e63a4a456c41bc3e1205317447636e89

CnC

malware.91clubgamez.com

Malicious

e63a4a456c41bc3e1205317447636e89

Ports

1604

Malicious

e63a4a456c41bc3e1205317447636e89

Ports

4782

Malicious

e63a4a456c41bc3e1205317447636e89

Ports

8080

Malicious

e63a4a456c41bc3e1205317447636e89

Ports

8848

Malicious

e63a4a456c41bc3e1205317447636e89

Ports

8888

Malicious

e63a4a456c41bc3e1205317447636e89

Ports

9527

Malicious

e63a4a456c41bc3e1205317447636e89

Mutex

DcRatMutex_qwqdanchun

Malicious

e63a4a456c41bc3e1205317447636e89

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙