Malicious
Malicious

f03ffbb531a1f029be6cf9486ccc7856

PE Executable
|
MD5: f03ffbb531a1f029be6cf9486ccc7856
|
Size: 1.72 MB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
f03ffbb531a1f029be6cf9486ccc7856
Sha1
d1dad38238b3bd386a2b28754a9f8a176d391cf8
Sha256
851e9edd2f30f5b6b9c0c6d51b26d7ea3b35e97898b83e1faff2c1bd3ba3649f
Sha384
25426a98d74bc1165019d9fec0794fa225b06219549720b765211f0f73ec4650a1b01eadfd8707b7b60b6907cb09dcd1
Sha512
83c367b7955ccad1454073bef1237bda69c169ce2a5cc297ac3fb79ba513638ca7072fd0fc0ea80e22c02cc726b45a7f2950245ae071efc4f9a777b2c3783d11
SSDeep
24576:k/gWS8VnvWjvXjpa3xQdpb4Q0Z0wPr6Mn/Ofa6bWo+U/B3U0iclfCZrAkRgtcBt:k/gWS8oe0c0zMn/OfaMb3UilfS8tcBt
TLSH
5885A69384C15DA4DFA1797A5736D3A044F307338A6AF366CA7F02E31E52BBD64A12D0

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
“Œ7ž9a‡cm–l5†ny‘5.cw˜0ovŽf•1k†x7ž65•
s‰y•u‘–pwh†poŒ1cž.81˜›gŽ’Ÿ9ava›vŸ‹mŽ
—Œrnp‡gžyp2tœw†–h.wofr‹2ˆ48‰qdf2q2g–
xOYBeJ7i8Wel3Ms.g.resources
aR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources
$this.Icon
[NBF]root.IconData
progressBar1.Modifiers
$this.Language
$this.GridSize
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

谷q(科¥@N

Full Name

谷q(科¥@N

EntryPoint

System.Void ††† †††††”.††† †††††“::††† †††††•(System.String[])

Scope Name

谷q(科¥@N

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xOYBeJ7i8Wel3Ms

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

42

Main Method

System.Void ††† †††††”.††† †††††“::††† †††††•(System.String[])

Main IL Instruction Count

19

Main IL

ldc.i4.0 <null> newarr System.Byte ldsfld ††† †††• ††† †††•::††† †††•‘ call System.Reflection.Assembly ††† †††•::††† †††•(System.Byte[],††† †††•) pop <null> leave IL_0046: ret pop <null> ldsfld ††† †††•’ ††† †††•’::††† †††•“ call System.Void ††† †††•’::††† †††•(††† †††•’) ldsfld System.Byte[] ††† ††††‡Š.††† ††††‡‰::††† ††††‡‹ ldsfld System.Byte[] ††† ††††‡Š.††† ††††‡‰::††† ††††‡Œ ldsfld ††† †††•” ††† †††•”::††† †††•• call System.Byte[] ††† †††•”::††† †††•(System.Byte[],System.Byte[],††† †††•”) stloc.0 <null> ldloc.0 <null> ldsfld ††† †††•– ††† †††•–::††† †††•— call System.Void ††† †††•–::††† †††•(System.Byte[],††† †††•–) leave IL_0046: ret ret <null>

Module Name

谷q(科¥@N

Full Name

谷q(科¥@N

EntryPoint

System.Void ††† †††††”.††† †††††“::††† †††††•(System.String[])

Scope Name

谷q(科¥@N

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xOYBeJ7i8Wel3Ms

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

42

Main Method

System.Void ††† †††††”.††† †††††“::††† †††††•(System.String[])

Main IL Instruction Count

19

Main IL

ldc.i4.0 <null> newarr System.Byte ldsfld ††† †††• ††† †††•::††† †††•‘ call System.Reflection.Assembly ††† †††•::††† †††•(System.Byte[],††† †††•) pop <null> leave IL_0046: ret pop <null> ldsfld ††† †††•’ ††† †††•’::††† †††•“ call System.Void ††† †††•’::††† †††•(††† †††•’) ldsfld System.Byte[] ††† ††††‡Š.††† ††††‡‰::††† ††††‡‹ ldsfld System.Byte[] ††† ††††‡Š.††† ††††‡‰::††† ††††‡Œ ldsfld ††† †††•” ††† †††•”::††† †††•• call System.Byte[] ††† †††•”::††† †††•(System.Byte[],System.Byte[],††† †††•”) stloc.0 <null> ldloc.0 <null> ldsfld ††† †††•– ††† †††•–::††† †††•— call System.Void ††† †††•–::††† †††•(System.Byte[],††† †††•–) leave IL_0046: ret ret <null>

f03ffbb531a1f029be6cf9486ccc7856 (1.72 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
“Œ7ž9a‡cm–l5†ny‘5.cw˜0ovŽf•1k†x7ž65•
s‰y•u‘–pwh†poŒ1cž.81˜›gŽ’Ÿ9ava›vŸ‹mŽ
—Œrnp‡gžyp2tœw†–h.wofr‹2ˆ48‰qdf2q2g–
xOYBeJ7i8Wel3Ms.g.resources
aR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources
$this.Icon
[NBF]root.IconData
progressBar1.Modifiers
$this.Language
$this.GridSize
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙