PESCAN.IO - Analysis Report |
|||||
File Structure: | |||||
![]() |
Information: |
Size: 1,01 MB SHA-256 Hash: F6523F14FC35CA6C86E63EF98C8A0FE199D0BE3213400B22A8AFF54A5D98D429 SHA-1 Hash: 9DC98834CE4E1BFF437A05E5A43C18440A37FCA5 MD5 Hash: 1C947C450AB6F66EBD3551F9D900B1EA Imphash: 69CA97FB5D686988321BAC50363255F0 MajorOSVersion: 5 CheckSum: 00000000 EntryPoint (rva): E474 SizeOfHeaders: 400 SizeOfImage: 10A000 ExportTable: EF980 ImportTable: EEE9C Characteristics: 102 TimeDateStamp: 553760B2 Date: 22/04/2015 8:49:54 File Type: EXE Number Of Sections: 4 ASLR: Enabled Section Names: .text, .rdata, .data, .reloc Number Of Executable Sections: 1 Subsystem: Unknown |
Sections Info: |
Section Name | Flags | ROffset | RSize | VOffset | VSize |
---|---|---|---|---|---|
.text | 60000020 (Executable) | 400 | B5A00 | 1000 | B5992 |
.rdata | 40000040 | B5E00 | 38A00 | B7000 | 389C4 |
.data | C0000040 (Writeable) | EE800 | 9C00 | F0000 | D9B8 |
.reloc | 42000040 | F8400 | B400 | FE000 | B400 |
Signatures: |
Rich Signature Analyzer: Code -> 4A4A66980E2B08CB0E2B08CB0E2B08CB615D96CB3F2B08CB615DA2CB672908CB615DA3CB392B08CB07539BCB012B08CB0E2B09CB962B08CB615DA7CB0A2B08CB615D93CB0F2B08CB615D95CB0F2B08CB526963680E2B08CB Footprint md5 Hash -> F34679B791EEF4F01951FEC9286F67FD • The Rich header apparently has not been modified |
Packer/Compiler: |
Compiler: Microsoft Visual C ++ Detect It Easy (die) • PE: compiler: EP:Microsoft Visual C/C++(2008-2010)[EXE32] • PE: compiler: Microsoft Visual C/C++(2010)[libcmt] • PE: linker: Microsoft Linker(10.0)[EXE32] • Entropy: 6.71248 |
Suspicious Functions: |
Library | Function | Description |
---|---|---|
KERNEL32.DLL | GetModuleFileNameA | Retrieve the fully qualified path for the executable file of a specified module. |
KERNEL32.DLL | GetModuleHandleA | Retrieves a handle to the specified module. |
KERNEL32.DLL | WriteFile | Writes data to a specified file or input/output (I/O) device. |
KERNEL32.DLL | LoadLibraryA | Loads the specified module into the address space of the calling process. |
KERNEL32.DLL | LoadLibraryW | Loads the specified module into the address space of the calling process. |
KERNEL32.DLL | CreateToolhelp32Snapshot | Creates a snapshot of the specified processes, heaps, threads, and modules. |
KERNEL32.DLL | GetProcAddress | Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL). |
KERNEL32.DLL | CreateFileA | Creates or opens a file or I/O device. |
KERNEL32.DLL | IsDebuggerPresent | Determines if the calling process is being debugged by a user-mode debugger. |
Ws2_32.DLL | socket | Create a communication endpoint for networking applications. |
Ws2_32.DLL | connect | Establish a connection to a specified socket. |
File Access: |
Xtunnel.exe .exe ADVAPI32.dll USER32.dll WINHTTP.dll WS2_32.dll SHELL32.dll KERNEL32.dll %s.dll NETAPI32.DLL .bat Temp |
File Access (UNICODE): |
@CorExitProcessmscoree.dll Temp |
Interest's Words: |
Encrypt Decrypt Encryption PassWord exec attrib start cipher hostname shutdown netstat certreq ping expand route |
URLs: |
http://www.openssl.org/support/faq.html |
Payloads: |
Unusual BP Cave > 15 Bytes - (0xCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC...) |
IP Addresses: |
176.31.112.10 127.0.0.1 |
Strings/Hex Code Found With The File Rules: |
• Rule Text (Ascii): WinAPI Sockets (bind) • Rule Text (Ascii): WinAPI Sockets (listen) • Rule Text (Ascii): WinAPI Sockets (accept) • Rule Text (Ascii): WinAPI Sockets (connect) • Rule Text (Ascii): WinAPI Sockets (send) • Rule Text (Ascii): File (CreateFile) • Rule Text (Ascii): File (WriteFile) • Rule Text (Ascii): File (ReadFile) • Rule Text (Ascii): Encryption (Blowfish) • Rule Text (Unicode): Encryption (Intel Hardware Cryptographic Service Provider) • Rule Text (Ascii): Encryption API (CryptAcquireContext) • Rule Text (Ascii): Encryption API (CryptReleaseContext) • Rule Text (Ascii): Anti-Analysis VM (IsDebuggerPresent) • Rule Text (Ascii): Anti-Analysis VM (GetVersion) • Rule Text (Ascii): Anti-Analysis VM (CreateToolhelp32Snapshot) • Rule Text (Ascii): Stealer malware focused on obtaining CVV codes to conduct unauthorized transactions (CVV) • Rule Text (Ascii): Malicious rerouting of traffic to an attacker-controlled site (Redirect) |
Intelligent String: |
• mscoree.dll • O0OKERNEL32.DLL • Microsoft Smartcardlogin • msSmartcardLogin • value.set • @@.\crypto\rand\md_rand.cYou need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html • invalid cmd number • invalid cmd name • command takes inputcmd not executable • NCONF_dump_fp • NCONF_dump_bio • CONF_dump_fp • C:\Build-OpenSSL-VC-32/ssl/certs • C:\Build-OpenSSL-VC-32/ssl/cert.pemSSL_CERT_DIR • NETAPI32.DLL • KERNEL32.DLL • ADVAPI32.DLL • d.ori • d.crl • value.bag • %s.dll • .com • .bat • .cmd • .exe • 176.31.112.10 • 127.0.0.1 • ADVAPI32.dll |
Extra 4n4lysis: |
Metric | Value | Percentage |
---|---|---|
Ascii Code | 655855 | 61,7036% |
Null Byte Code | 171419 | 16,1273% |
© 2025 All rights reserved.