Malicious
Malicious

f3ac1ae11c989d964761ac6810433e89

PE Executable
|
MD5: f3ac1ae11c989d964761ac6810433e89
|
Size: 398.85 KB
|
application/x-dosexec

Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
f3ac1ae11c989d964761ac6810433e89
Sha1
903b62a9a060f87b71ca42e8f3062e34ac03952f
Sha256
1ca80c889b40252a61040f48be8528a52d7fe6aa67ed83e8fdfe34d0808cb34d
Sha384
195cd767b9712c5f8d548e344b9aad2aa4484b9e9f7497e493373b7c796461e81a454abf211240689428d6ce6cd812da
Sha512
d9bf7c2b5949d694c18715c55fe764c3749e62bbc043949e06b1f7cb35bd9a9c9e99c72d09bbae6a3123a94ea7b15e56f382e300177205c4a33ccc325e8dfe42
SSDeep
12288:/tiFvjfqd09rowhOLfxhl5gBNSl1jiwtTc9K:/tyridAhc5Gm1Ok
TLSH
BB84238922DB8222D171EE7352F3A471733E8E5E62423D6B454677CEBAF700685C127E

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Malicious
rjefxdxyftpux.Resources
Malicious
Xeno.exe
Malicious
[Authenticode]_afceb3fb.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.reloc
.rsrc
Resources
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Xenovir.exe
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
6q0yhkfacing6k34co06
fqycemk72hce93uap7v5bzax2h
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

XBinderOutput.exe

Full Name

XBinderOutput.exe

EntryPoint

System.Void Program::Main()

Scope Name

XBinderOutput.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XBinderOutput

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

23

Main Method

System.Void Program::Main()

Main IL Instruction Count

57

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: call System.Boolean Program::DetectVirtualMachine() call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Boolean Program::DetectVirtualMachine() call System.Boolean Program::Emulator() or <null> call System.Boolean Program::DetectDebugger() or <null> call System.Boolean Program::DetectSandboxie() or <null> call System.Boolean Program::anyrun() or <null> brfalse.s IL_0040: leave.s IL_0050 ldnull <null> call System.Void System.Environment::FailFast(System.String) leave.s IL_0050: call System.Boolean Program::AdminCheck() dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.0 <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_0050: call System.Boolean Program::AdminCheck() call System.Boolean Program::AdminCheck() brtrue.s IL_00B1: ldnull newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() stloc.1 <null> ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::GetCurrentProcess() callvirt System.Diagnostics.ProcessModule System.Diagnostics.Process::get_MainModule() callvirt System.String System.Diagnostics.ProcessModule::get_FileName() callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) ldloc.1 <null> ldstr runas callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Verb(System.String) ldloc.1 <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) leave.s IL_00AF: br.s IL_00B8 dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.2 <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_00AF: br.s IL_00B8 br.s IL_00B8: ret ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

Module Name

XBinderOutput.exe

Full Name

XBinderOutput.exe

EntryPoint

System.Void Program::Main()

Scope Name

XBinderOutput.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XBinderOutput

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

23

Main Method

System.Void Program::Main()

Main IL Instruction Count

57

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: call System.Boolean Program::DetectVirtualMachine() call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Boolean Program::DetectVirtualMachine() call System.Boolean Program::Emulator() or <null> call System.Boolean Program::DetectDebugger() or <null> call System.Boolean Program::DetectSandboxie() or <null> call System.Boolean Program::anyrun() or <null> brfalse.s IL_0040: leave.s IL_0050 ldnull <null> call System.Void System.Environment::FailFast(System.String) leave.s IL_0050: call System.Boolean Program::AdminCheck() dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.0 <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_0050: call System.Boolean Program::AdminCheck() call System.Boolean Program::AdminCheck() brtrue.s IL_00B1: ldnull newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() stloc.1 <null> ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::GetCurrentProcess() callvirt System.Diagnostics.ProcessModule System.Diagnostics.Process::get_MainModule() callvirt System.String System.Diagnostics.ProcessModule::get_FileName() callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) ldloc.1 <null> ldstr runas callvirt System.Void System.Diagnostics.ProcessStartInfo::set_Verb(System.String) ldloc.1 <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) ldloc.1 <null> call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) leave.s IL_00AF: br.s IL_00B8 dup <null> call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::SetProjectError(System.Exception) stloc.2 <null> call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) call System.Void Microsoft.VisualBasic.CompilerServices.ProjectData::ClearProjectError() leave.s IL_00AF: br.s IL_00B8 br.s IL_00B8: ret ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

f3ac1ae11c989d964761ac6810433e89 (398.85 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Malicious
rjefxdxyftpux.Resources
Malicious
Xeno.exe
Malicious
[Authenticode]_afceb3fb.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.reloc
.rsrc
Resources
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Xenovir.exe
Malicious
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
.Net Resources
6q0yhkfacing6k34co06
fqycemk72hce93uap7v5bzax2h
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙