Analysis
-
max time kernel
128s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 08:32
Static task
static1
Behavioral task
behavioral1
Sample
06DCC8EC05A3EC53B0066CE702D40993F9862644A37DD.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
06DCC8EC05A3EC53B0066CE702D40993F9862644A37DD.exe
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
06DCC8EC05A3EC53B0066CE702D40993F9862644A37DD.exe
-
Size
1.6MB
-
MD5
dc0ad30780b013edc6d44f42873cca6f
-
SHA1
7bc36922bb282fb37ae76ca0ab584937a32555b4
-
SHA256
06dcc8ec05a3ec53b0066ce702d40993f9862644a37ddce050e03b23ba65a746
-
SHA512
4672fe9cdfe00cff01bedea476b0d4405f443418d78dc3f4dfb5bd469f7124d89e9ba2647ca48f48622a7040d1cc449e43905b575d497d4663a80053f5c49523
Score
9/10
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/2036-55-0x0000000001300000-0x00000000014A2000-memory.dmp net_reactor
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2036-55-0x0000000001300000-0x00000000014A2000-memory.dmpFilesize
1.6MB
-
memory/2036-56-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/2036-57-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/2036-58-0x0000000004F70000-0x00000000050DA000-memory.dmpFilesize
1.4MB
-
memory/2036-59-0x00000000003B0000-0x00000000003BE000-memory.dmpFilesize
56KB