Test Report from Malcat MCP with Claude on YAPA binary
The following is a test run of using Malcat with MCP . Malware Analysis Report — xchanger.exe Malware Analysis Report File: xchanger.exe | Analyzed: 2026-03-12 | Tool: Malcat + .NET Disassembly MALICIOUS — Trojanized Installer / C2 Dropper File Metadata Filename xchanger.exe File Size 1,779,416 bytes (~1.7 MB) Type PE / .NET (DOTNET) Version 2.0.20.403 Internal Name XChanger.exe Copyright XChanger Copyright © 2026 SHA-256 356ca46f39b480d0ab523535f98e64ae0ec58fe1fdbb8ffc02f54b814445e9d0 Hardcoded XOR Key NetworkManager — Scramble / Unscramble Xt7Kp2Lm9Qw4Rv8Y-x1729583156 Length: 29 characters | Found at EA: 0xE771, 0xFB1A // Rolling XOR per character, then Base64-encoded for transmission byte lambda(char c, int i) { return (byte)(c ^ "Xt7Kp2Lm9Qw4Rv8Y-x1729583156"[i % 29]); } // Called by: PostPayloadAsync, SendConfigNotificationAsync, // TransmitProfileReportAsync, BeginSe...