Malicious
Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

PE Executable
|
MD5: e9cba5b961a3c9b6b2880de1c5e5f08d
|
Size: 66.05 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
e9cba5b961a3c9b6b2880de1c5e5f08d
Sha1
ae649d244333cc2479f3f00665dcf0ec1fbeaaca
Sha256
b09c61aa16263c0ac716c20dc25bfa65116ca73df885f5d22e773f4ea93c54d8
Sha384
62550113a7b1d289fa057c2bffff2dbb83f3eb6b460b774a6f905e4de141b65f643efb87b605e029915804a5ee8e59bf
Sha512
72376307c3d288daf2946a67049514f7d873fab79686ea99ad06deeef1e4522f0b71cd3993014d9935675b48526692065adff7b20a94d710eca63df233e29a59
SSDeep
768:ORuPCAQqkZiPSnHi29JYLcXveeObMbNCl1+6SCv7mqb2nIpwH1o3XVc28cSt8GM5:U9qvIgeeiMl8GbbXwF8SSGLZVclN
TLSH
C8535C002788CA25E1BD9AB8ACF2550146B5DA772102DB5E7CC414DF9B9EFC64A133FE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

S3pNSEhDcTdWMTNRTFJDcEp5czk3aDF0Q056SHZieWY=

Pastebin

-

Certificate

MIICMDCCAZmgAwIBAgIVAP+Lysysikb/Vr+Mh7wmOmxUFpXlMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI1MDQwNTEzMDMwNFoXDTM2MDExMzEzMDMwNFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAIlKk0BzQ0CHrQ9N5TMr4jaU+c0dVK0h8K7TrqhXsxGVnAit86Z+5fQ9uppD9o5IMVI0w7Kl63z/+8S8ohv+xyxe6He7T4dqrT4uezH6IIhn15LExBC9RkSMsKjbXKYGn38eilZxOEfcH91wxPC9suzP+nbxNGrPqrgN9I5jxSV3AgMBAAGjMjAwMB0GA1UdDgQWBBTaTBqJYDKjb8oI7BbEwb5sbgyorDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAHG3C+YM7vh4G2+1N2DM0MEgZk1/OVLIw1hiChHsFXrItXfu8RvaJdaAJkRwz5okHXG+3BA3w48Gqgq369Zj4FYsofBKj21XARmBN4Up9PAl6kHzz+nvSlyYYU3Sfyv2LiV/b18S0nMjzg+hiZoMFX/Pwc8fuZx3TFwG7xGICkwy

ServerSignature

gYNEosWDtg4KfNbw7xGTE7pjcQQonVSy/NKrEMS4Tk7I/FZgwYvBgkm3XJjZxn0oBaPDnSEnP34FE5rMSoMiuhI+rQSJYBo53puvU1AoCFLHNQeMAlByo+G/oGYPGKm4402bM7q/rM0+dNy/pbJP9JGqwONCMRwafMBYmdilRfo=

Install

false

BDOS

false

Anti-VM

false

Install File

QAGAStrategicImperium.exe

Install-Folder

%AppData%

Hosts

www.tarunashillongguwahatitaxiservice.in.net,tarunashillongguwahatitaxiservice.in.net,kip.eu.com,www.kip.eu.com

Ports

80,443,4444,4782,5555,6060,6666,8080,8848

Mutex

TFDS_TitanPrime_SentinelLock_9p0q1r2s

Version

1.0.7

Delay

1

Group

AetherCloud_2042

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

S3pNSEhDcTdWMTNRTFJDcEp5czk3aDF0Q056SHZieWY=

CnC

www.tarunashillongguwahatitaxiservice.in.net

CnC

tarunashillongguwahatitaxiservice.in.net

CnC

kip.eu.com

CnC

www.kip.eu.com

Ports

80

Ports

443

Ports

4444

Ports

4782

Ports

5555

Ports

6060

Ports

6666

Ports

8080

Ports

8848

Mutex

TFDS_TitanPrime_SentinelLock_9p0q1r2s

e9cba5b961a3c9b6b2880de1c5e5f08d (66.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

S3pNSEhDcTdWMTNRTFJDcEp5czk3aDF0Q056SHZieWY=

Pastebin

-

Certificate

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

ServerSignature

gYNEosWDtg4KfNbw7xGTE7pjcQQonVSy/NKrEMS4Tk7I/FZgwYvBgkm3XJjZxn0oBaPDnSEnP34FE5rMSoMiuhI+rQSJYBo53puvU1AoCFLHNQeMAlByo+G/oGYPGKm4402bM7q/rM0+dNy/pbJP9JGqwONCMRwafMBYmdilRfo=

Install

false

BDOS

false

Anti-VM

false

Install File

QAGAStrategicImperium.exe

Install-Folder

%AppData%

Hosts

www.tarunashillongguwahatitaxiservice.in.net,tarunashillongguwahatitaxiservice.in.net,kip.eu.com,www.kip.eu.com

Ports

80,443,4444,4782,5555,6060,6666,8080,8848

Mutex

TFDS_TitanPrime_SentinelLock_9p0q1r2s

Version

1.0.7

Delay

1

Group

AetherCloud_2042

Artefacts
Name
Value Location
Key (AES_256)

S3pNSEhDcTdWMTNRTFJDcEp5czk3aDF0Q056SHZieWY=

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

CnC

www.tarunashillongguwahatitaxiservice.in.net

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

CnC

tarunashillongguwahatitaxiservice.in.net

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

CnC

kip.eu.com

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

CnC

www.kip.eu.com

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

80

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

443

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

4444

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

4782

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

5555

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

6060

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

6666

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

8080

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Ports

8848

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

Mutex

TFDS_TitanPrime_SentinelLock_9p0q1r2s

Malicious

e9cba5b961a3c9b6b2880de1c5e5f08d

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙