Malicious
Malicious

f107bd5f6bda82077512f3d69a9f473a

PE Executable
|
MD5: f107bd5f6bda82077512f3d69a9f473a
|
Size: 68.61 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
f107bd5f6bda82077512f3d69a9f473a
Sha1
f401858323fb60b942b7151d05dd93bbaaff20c1
Sha256
db24859d792efb4ea530682ad56d7fc93898744e6fa8473e66e40009d95a96ba
Sha384
41459723c297cb01a64ec841179509081ae74463e7d8d2cc4b8c0fc8105f968fb9396a05b45d6fb20b916182cea67e36
Sha512
d141a4ef6f6ffc9221a5a73726a87902f1a0426aef0cfe9ccdbe9296c95305527ae8a087c3d71dc82e676cebe07bfc1c3f8e59cbd18257450faf4647d92ec568
SSDeep
1536:ooLuNzYZ8LuFpTGbb0wcIcmGtlVJdl8VclN:ooAzYZ8qFtGbb0Ecr+Y
TLSH
46635C0437C9C921E2AD4AB8ADF2550106B5D5772102DB5E7CC804DFAB9FFCA4A127EE

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ZUNzMmdTNWQzd2hoVHBCWmFLbk96TkkwVFpxdXpRZkw=

Pastebin

-

Certificate

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

ServerSignature

c9fWPmVmlTm8n1aM29e8fnEO0Y2uCjXZtcbQZz4Etab46oDEEFoRFWsK0uXPnkYX6+u6Uqanx0Lt3CgTGck2x3jw4Wy1dhF3Pnb21DyfaEsAbND/BZGV4AxrFMnuRrEzoWZx9dFK6AmGbojUiLT5A1fj4aET2ckOaFXWe/WvuHg=

Install

true

BDOS

false

Anti-VM

false

Install File

ParlayArchitect.exe

Install-Folder

%AppData%

Hosts

ecom.in.net,www.ecom.in.net,dwuxon.za.com,www.dwuxon.za.com,ubdecp.sa.com,www.ubdecp.sa.com,lxzzyb.sa.com,www.lxzzyb.sa.com,playercodes.in.net,www.playercodes.in.net,gro.uk.com,www.gro.uk.com

Ports

80,443,1337,1604,4444,4782,5555,8848

Mutex

ParlayArchitect_SessionLock_1

Version

1.0.7

Delay

2

Group

Optimization

Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Parlay Architect.exe

Full Name

Parlay Architect.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Parlay Architect.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Parlay Architect

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Module Name

Parlay Architect.exe

Full Name

Parlay Architect.exe

EntryPoint

System.Void Client.Program::Main()

Scope Name

Parlay Architect.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Parlay Architect

Assembly Version

1.0.7.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

157

Main Method

System.Void Client.Program::Main()

Main IL Instruction Count

77

Main IL

ldc.i4.0 <null> stloc.0 <null> br IL_0015: ldloc.0 ldc.i4 1000 call System.Void System.Threading.Thread::Sleep(System.Int32) ldloc.0 <null> ldc.i4.1 <null> add <null> stloc.0 <null> ldloc.0 <null> ldsfld System.String Client.Settings::De_lay call System.Int32 System.Convert::ToInt32(System.String) blt.s IL_0007: ldc.i4 1000 call System.Boolean Client.Settings::InitializeSettings() brtrue IL_0032: nop ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) nop <null> ldsfld System.String Client.Settings::An_ti call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0047: leave IL_0052 call System.Void Client.Helper.Anti_Analysis::RunAntiAnalysis() leave IL_0052: call System.Void Client.Helper.A::B() pop <null> leave IL_0052: call System.Void Client.Helper.A::B() call System.Void Client.Helper.A::B() call System.Boolean Client.Helper.MutexControl::CreateMutex() brtrue IL_0067: leave IL_0072 ldc.i4.0 <null> call System.Void System.Environment::Exit(System.Int32) leave IL_0072: nop pop <null> leave IL_0072: nop nop <null> ldsfld System.String Client.Settings::Anti_Process call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_0087: leave IL_0092 call System.Void Client.Helper.AntiProcess::StartBlock() leave IL_0092: nop pop <null> leave IL_0092: nop nop <null> ldsfld System.String Client.Settings::BS_OD call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00B1: leave IL_00BC call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00B1: leave IL_00BC call System.Void Client.Helper.ProcessCritical::Set() leave IL_00BC: nop pop <null> leave IL_00BC: nop nop <null> ldsfld System.String Client.Settings::In_stall call System.Boolean System.Convert::ToBoolean(System.String) brfalse IL_00D1: leave IL_00DC call System.Void Client.Install.NormalStartup::Install() leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() pop <null> leave IL_00DC: call System.Void Client.Helper.Methods::PreventSleep() call System.Void Client.Helper.Methods::PreventSleep() call System.Boolean Client.Helper.Methods::IsAdmin() brfalse IL_00F0: leave IL_00FB call System.Void Client.Helper.Methods::ClearSetting() leave IL_00FB: nop pop <null> leave IL_00FB: nop nop <null> call System.Boolean Client.Connection.ClientSocket::get_IsConnected() brtrue IL_0110: leave IL_011B call System.Void Client.Connection.ClientSocket::Reconnect() call System.Void Client.Connection.ClientSocket::InitializeClient() leave IL_011B: ldc.i4 5000 pop <null> leave IL_011B: ldc.i4 5000 ldc.i4 5000 call System.Void System.Threading.Thread::Sleep(System.Int32) br.s IL_00FB: nop

Artefacts
Name
Value
Key (AES_256)

ZUNzMmdTNWQzd2hoVHBCWmFLbk96TkkwVFpxdXpRZkw=

CnC

ecom.in.net

CnC

www.ecom.in.net

CnC

dwuxon.za.com

CnC

www.dwuxon.za.com

CnC

ubdecp.sa.com

CnC

www.ubdecp.sa.com

CnC

lxzzyb.sa.com

CnC

www.lxzzyb.sa.com

CnC

playercodes.in.net

CnC

www.playercodes.in.net

CnC

gro.uk.com

CnC

www.gro.uk.com

Ports

80

Ports

443

Ports

1337

Ports

1604

Ports

4444

Ports

4782

Ports

5555

Ports

8848

Mutex

ParlayArchitect_SessionLock_1

f107bd5f6bda82077512f3d69a9f473a (68.61 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
Malware Configuration - DcRat config.
Config. Field
Value
Key (AES_256)

ZUNzMmdTNWQzd2hoVHBCWmFLbk96TkkwVFpxdXpRZkw=

Pastebin

-

Certificate

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

ServerSignature

c9fWPmVmlTm8n1aM29e8fnEO0Y2uCjXZtcbQZz4Etab46oDEEFoRFWsK0uXPnkYX6+u6Uqanx0Lt3CgTGck2x3jw4Wy1dhF3Pnb21DyfaEsAbND/BZGV4AxrFMnuRrEzoWZx9dFK6AmGbojUiLT5A1fj4aET2ckOaFXWe/WvuHg=

Install

true

BDOS

false

Anti-VM

false

Install File

ParlayArchitect.exe

Install-Folder

%AppData%

Hosts

ecom.in.net,www.ecom.in.net,dwuxon.za.com,www.dwuxon.za.com,ubdecp.sa.com,www.ubdecp.sa.com,lxzzyb.sa.com,www.lxzzyb.sa.com,playercodes.in.net,www.playercodes.in.net,gro.uk.com,www.gro.uk.com

Ports

80,443,1337,1604,4444,4782,5555,8848

Mutex

ParlayArchitect_SessionLock_1

Version

1.0.7

Delay

2

Group

Optimization

Artefacts
Name
Value Location
Key (AES_256)

ZUNzMmdTNWQzd2hoVHBCWmFLbk96TkkwVFpxdXpRZkw=

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

ecom.in.net

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

www.ecom.in.net

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

dwuxon.za.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

www.dwuxon.za.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

ubdecp.sa.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

www.ubdecp.sa.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

lxzzyb.sa.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

www.lxzzyb.sa.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

playercodes.in.net

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

www.playercodes.in.net

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

gro.uk.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

CnC

www.gro.uk.com

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

80

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

443

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

1337

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

1604

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

4444

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

4782

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

5555

Malicious

f107bd5f6bda82077512f3d69a9f473a

Ports

8848

Malicious

f107bd5f6bda82077512f3d69a9f473a

Mutex

ParlayArchitect_SessionLock_1

Malicious

f107bd5f6bda82077512f3d69a9f473a

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙