Malicious
Malicious

ec0659799a60c1cd24dd39c7a50c395a

PE Executable
|
MD5: ec0659799a60c1cd24dd39c7a50c395a
|
Size: 75.26 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
ec0659799a60c1cd24dd39c7a50c395a
Sha1
7efed855536c9d2af4c1f3fd3080f389b399fc87
Sha256
9ec48ed73297b001e892717972fe5e792bc7c593d89d87089a5e652c5dcaf935
Sha384
4c20894c44bd089d0e7abdc065c5c6c0d8970ad55af0b62509e472a0831b12d20b3102697c88fdbecc0e57d68accab68
Sha512
c8f3b5cace415425c5f665b1fec7f22caec6da061e73504a6d95afe7a60afff3ea28fa6e0a6d951166a5d67b8ca11625d463cc419f0d5e1cf971d4a6e0966b75
SSDeep
1536:EAEuRjFGqTYUbLh98LnFXFubfJeNpqKmY7:EsLGQYUbLUnAeWz
TLSH
43733B2C2FB78A11E35D4674ACA3A50707B0C5372849C61E3C947CC7DF6AAC585A26EF

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

SXBZWVlYc01ZTVBIczFkcGtGNklKSEx4WEpndmljV0M=

Pastebin

-

Certificate

MIICKTCCAZKgAwIBAgIVAO1/N0q1acErLuDpQr9b8rwzZ6C/MA0GCSqGSIb3DQEBDQUAMF0xDjAMBgNVBAMMBUVCT0xBMRMwEQYDVQQLDApxd3FkYW5jaHVuMRwwGgYDVQQKDBNEY1JhdCBCeSBxd3FkYW5jaHVuMQswCQYDVQQHDAJTSDELMAkGA1UEBhMCQ04wHhcNMjUwMjE3MDc1MTMzWhcNMzUxMTI3MDc1MTMzWjAQMQ4wDAYDVQQDDAVEY1JhdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyfNcW57svBKenV2jyH/WU8/dLzvkivwV6+WMojFxAZjvAwPcN4yBxJlNpG5hwq+slTtD9g+dk7XV3g/amWUvPzK0NpoY1ThNSlyC/H/Y0DUDTau7dsK40jsTeKOQdHEvkHIs0kImWP9TYrQdlolR9OzJWR5sIYhaJxZi2AOz+dcCAwEAAaMyMDAwHQYDVR0OBBYEFIuWSJA8CdSnBr1VdGLGs9FGzV5GMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEAodnKxkipDfRNK6iShDjKSTEDfSVlNtu30xkBUTNlGQGC9ujzoeEhIETAB4VJkuJG4J+Fbbsvs8zgfiyqV4VlcU5mAJrNXer1iWh7QOTwBqEp3/TYResO5ddYn4g+swrv/yOz6nhRQt4G60RvX8gg8BgBPesW43OjyIxf

ServerSignature

Ws5T1q1rVdobyGDTugM/Ap9b8taBCdV99mW7m8/nLL62eZikZ1o+A+gC5O/u/H6Ayz13BkSAgl6Dnh8wVb+1zLyhiBzP7rKyBnsKDqfHpRTGO7SeCWdFQlCqLyjl6cwsPa+7Fha9vN8LhiK1syFc4LDxUE4WzvLt

Install

true

BDOS

false

Anti-VM

true

Install File

CromeServices.exe

Install-Folder

%AppData%

Ports

4242,26699

Delay

1

Group

Default

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

chrome.exe

Full Name

chrome.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

chrome.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

chrome

Assembly Version

3.6.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

163

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.Bjifos::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProdfceassC1sritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Mesth4ods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

chrome.exe

Full Name

chrome.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

chrome.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

chrome

Assembly Version

3.6.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

163

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.Bjifos::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProdfceassC1sritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Void Client.Helper.Mesth4ods::PreventSleep() call System.Boolean Client.Helper.Mesth4ods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Mesth4ods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

SXBZWVlYc01ZTVBIczFkcGtGNklKSEx4WEpndmljV0M=

Ports

4242

Ports

26699

ec0659799a60c1cd24dd39c7a50c395a (75.26 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

SXBZWVlYc01ZTVBIczFkcGtGNklKSEx4WEpndmljV0M=

Pastebin

-

Certificate

MIICKTCCAZKgAwIBAgIVAO1/N0q1acErLuDpQr9b8rwzZ6C/MA0GCSqGSIb3DQEBDQUAMF0xDjAMBgNVBAMMBUVCT0xBMRMwEQYDVQQLDApxd3FkYW5jaHVuMRwwGgYDVQQKDBNEY1JhdCBCeSBxd3FkYW5jaHVuMQswCQYDVQQHDAJTSDELMAkGA1UEBhMCQ04wHhcNMjUwMjE3MDc1MTMzWhcNMzUxMTI3MDc1MTMzWjAQMQ4wDAYDVQQDDAVEY1JhdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAyfNcW57svBKenV2jyH/WU8/dLzvkivwV6+WMojFxAZjvAwPcN4yBxJlNpG5hwq+slTtD9g+dk7XV3g/amWUvPzK0NpoY1ThNSlyC/H/Y0DUDTau7dsK40jsTeKOQdHEvkHIs0kImWP9TYrQdlolR9OzJWR5sIYhaJxZi2AOz+dcCAwEAAaMyMDAwHQYDVR0OBBYEFIuWSJA8CdSnBr1VdGLGs9FGzV5GMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADgYEAodnKxkipDfRNK6iShDjKSTEDfSVlNtu30xkBUTNlGQGC9ujzoeEhIETAB4VJkuJG4J+Fbbsvs8zgfiyqV4VlcU5mAJrNXer1iWh7QOTwBqEp3/TYResO5ddYn4g+swrv/yOz6nhRQt4G60RvX8gg8BgBPesW43OjyIxf

ServerSignature

Ws5T1q1rVdobyGDTugM/Ap9b8taBCdV99mW7m8/nLL62eZikZ1o+A+gC5O/u/H6Ayz13BkSAgl6Dnh8wVb+1zLyhiBzP7rKyBnsKDqfHpRTGO7SeCWdFQlCqLyjl6cwsPa+7Fha9vN8LhiK1syFc4LDxUE4WzvLt

Install

true

BDOS

false

Anti-VM

true

Install File

CromeServices.exe

Install-Folder

%AppData%

Ports

4242,26699

Delay

1

Group

Default

Artefacts
Name
Value Location
Key (AES_256)

SXBZWVlYc01ZTVBIczFkcGtGNklKSEx4WEpndmljV0M=

Malicious

ec0659799a60c1cd24dd39c7a50c395a

Ports

4242

Malicious

ec0659799a60c1cd24dd39c7a50c395a

Ports

26699

Malicious

ec0659799a60c1cd24dd39c7a50c395a

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙