Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
249KB
-
MD5
b6a18789ab0263f4eab7ab97287ecbee
-
SHA1
8787cee17a183d20ad0251076168953110ab90be
-
SHA256
651ee42db18f616fad32be821a25bed84dc6c75bad45284382273d3d07d55597
-
SHA512
a1c2c4e3658b041c50948aabc2c86b54a190b7cbcf335825b7e6f631cf06118e5a643c1b9cef47e400691c085c102b92aac4b8210bb35b728ccafe5bafe615bb
-
SSDEEP
1536:x6r3JgI5plLY23JQvnFCohuftzEPKqa4gi6CMhSZFiyBRZkKs3I6C04s1lPkWttv:xK3xtLY2NfWyq+wpRTMaqx
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule sample net_reactor
Files
-
file.exe.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ