Suspicious
Suspect

fbcedee23bb560f3b01e95f86a4df505

PE Executable
|
MD5: fbcedee23bb560f3b01e95f86a4df505
|
Size: 52.22 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
fbcedee23bb560f3b01e95f86a4df505
Sha1
c425fdea0cc580e5b50bcc1b18e45ac11a879cd6
Sha256
0eeb4d57a938c639ea9d8c9bd557f8540ce29017414ba7801b4c15e42e4c08ed
Sha384
c30867a1b179ebbd8f01e1a90ef425a4d27987231b74f49aea85ef4c1105ac90a2389b6293e8301f90073dd5500112c0
Sha512
a70f2f501105a71de44391334f56cd0cc6e0f9982547c641e5071058c59c67462d79df28ebe29c422d230f259a4fee33fe4dfeebcf31a171828c794811b4199b
SSDeep
768:0LgVYwyUj3/3QKIe/rz48K4w8KX4gKsyuwHwf2KK65Ijnr2guDEm8S9Vgqgb:IgVYwlfQIvn8X6/fHHnr2vDZgqm
TLSH
5C332A286BCC9A63C5EA4BBED8D277900774B0B6E70FEB0B298401351D177E69813E57

PeID

Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
{2a1f8a61-d41a-4e70-a8e9-87bd3fb46201}
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Qlvjtoxka

Full Name

Qlvjtoxka

EntryPoint

System.Void .::()

Scope Name

Qlvjtoxka

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Qlvjtoxka

Assembly Version

1.0.6544.26318

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

69

Main Method

System.Void .::()

Main IL Instruction Count

82

Main IL

br IL_00F4: newobj System.Void ./::.ctor() br IL_00FE: stloc.0 ldstr jJ4A1oIJ8anWGcpOW+yv2g== br IL_0104: stloc.1 ldc.i4.3 <null> brfalse.s IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ldstr DSd1mWtwulQ= br IL_010A: stloc.2 ldsfld System.Func`1<System.Byte[]> ./:: dup <null> brtrue.s IL_0040: br IL_0110 pop <null> ldsfld ./ ./:: ldftn System.Byte[] ./::() newobj System.Void System.Func`1<System.Byte[]>::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Func`1<System.Byte[]> ./:: br IL_0110: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_011A: ldloc.0 br IL_0120: ldloc.1 br IL_0126: ldloc.2 br IL_012C: newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: ldloc.0 <null> newobj System.Void .::.ctor() stfld . ./:: ldloc.0 <null> ldstr rZfupm29ZR9bCnSWVw.JpAOO5OoQj77dmaSyV ldstr UX6tJN7Py newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: dup <null> ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.Reflection.Assembly) newobj System.Void System.Action`1<System.Reflection.Assembly>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.Reflection.Assembly>) ldloc.0 <null> ldfld . ./:: ldsfld System.Action ./:: dup <null> brtrue.s IL_00E3: callvirt System.Void .::(System.Action) pop <null> ldsfld ./ ./:: ldftn System.Void ./::() newobj System.Void System.Action::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Action ./:: callvirt System.Void .::(System.Action) call System.Void .::(.) ldc.i4.3 <null> brfalse IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ret <null> newobj System.Void ./::.ctor() br IL_0005: br IL_00FE stloc.0 <null> br IL_000A: ldstr "jJ4A1oIJ8anWGcpOW+yv2g==" stloc.1 <null> br IL_0014: ldc.i4.3 stloc.2 <null> br IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_0045: br IL_011A ldloc.0 <null> br IL_004A: br IL_0120 ldloc.1 <null> br IL_004F: br IL_0126 ldloc.2 <null> br IL_0054: br IL_012C newobj System.Void .::.ctor(System.String,System.String) br IL_0059: stfld . ./::

Module Name

Qlvjtoxka

Full Name

Qlvjtoxka

EntryPoint

System.Void .::()

Scope Name

Qlvjtoxka

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Qlvjtoxka

Assembly Version

1.0.6544.26318

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

69

Main Method

System.Void .::()

Main IL Instruction Count

82

Main IL

br IL_00F4: newobj System.Void ./::.ctor() br IL_00FE: stloc.0 ldstr jJ4A1oIJ8anWGcpOW+yv2g== br IL_0104: stloc.1 ldc.i4.3 <null> brfalse.s IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ldstr DSd1mWtwulQ= br IL_010A: stloc.2 ldsfld System.Func`1<System.Byte[]> ./:: dup <null> brtrue.s IL_0040: br IL_0110 pop <null> ldsfld ./ ./:: ldftn System.Byte[] ./::() newobj System.Void System.Func`1<System.Byte[]>::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Func`1<System.Byte[]> ./:: br IL_0110: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_011A: ldloc.0 br IL_0120: ldloc.1 br IL_0126: ldloc.2 br IL_012C: newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: ldloc.0 <null> newobj System.Void .::.ctor() stfld . ./:: ldloc.0 <null> ldstr rZfupm29ZR9bCnSWVw.JpAOO5OoQj77dmaSyV ldstr UX6tJN7Py newobj System.Void .::.ctor(System.String,System.String) stfld . ./:: dup <null> ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.IO.MemoryStream) newobj System.Void System.Action`1<System.IO.MemoryStream>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.IO.MemoryStream>) ldloc.0 <null> ldfld . ./:: ldloc.0 <null> ldftn System.Void ./::(System.Reflection.Assembly) newobj System.Void System.Action`1<System.Reflection.Assembly>::.ctor(System.Object,System.IntPtr) callvirt System.Void .::(System.Action`1<System.Reflection.Assembly>) ldloc.0 <null> ldfld . ./:: ldsfld System.Action ./:: dup <null> brtrue.s IL_00E3: callvirt System.Void .::(System.Action) pop <null> ldsfld ./ ./:: ldftn System.Void ./::() newobj System.Void System.Action::.ctor(System.Object,System.IntPtr) dup <null> stsfld System.Action ./:: callvirt System.Void .::(System.Action) call System.Void .::(.) ldc.i4.3 <null> brfalse IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: ret <null> newobj System.Void ./::.ctor() br IL_0005: br IL_00FE stloc.0 <null> br IL_000A: ldstr "jJ4A1oIJ8anWGcpOW+yv2g==" stloc.1 <null> br IL_0014: ldc.i4.3 stloc.2 <null> br IL_0021: ldsfld System.Func`1<System.Byte[]> ./:: newobj System.Void .::.ctor(System.Func`1<System.Byte[]>) br IL_0045: br IL_011A ldloc.0 <null> br IL_004A: br IL_0120 ldloc.1 <null> br IL_004F: br IL_0126 ldloc.2 <null> br IL_0054: br IL_012C newobj System.Void .::.ctor(System.String,System.String) br IL_0059: stfld . ./::

fbcedee23bb560f3b01e95f86a4df505 (52.22 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
{2a1f8a61-d41a-4e70-a8e9-87bd3fb46201}
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙