Behavioral task
behavioral1
Sample
43f13ec00b6df87637b5863be3ffe01fc85947a8918f567c1713dd8a4d6ba908.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
43f13ec00b6df87637b5863be3ffe01fc85947a8918f567c1713dd8a4d6ba908.exe
Resource
win10v2004-20230220-en
General
-
Target
43f13ec00b6df87637b5863be3ffe01fc85947a8918f567c1713dd8a4d6ba908.zip
-
Size
4.4MB
-
MD5
2cddfb1c85f0f71dc1c6b7881f51e736
-
SHA1
67058270a7688a5bfd24291966c93f77c150a193
-
SHA256
ec77d8e5e9ad405e74bc0780d1fd6b4070dfd155a0556ef3288ac493a1f28448
-
SHA512
00b4f2f991337d29fdd23e580dbcb6407e2524c26c8cc89daf47b9a881cd2d5bae69fe5596d491de9a41103871551467bcfaf6f7bb5c3aae561ea122a84724aa
-
SSDEEP
98304:svD85p47TRevNW0hxW1s5DcjTPJONcKnFLnLR41zsLwBS:svD85pEeFfh8GyFKpnlOMX
Malware Config
Signatures
-
Raccoon family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule static1/unpack001/43f13ec00b6df87637b5863be3ffe01fc85947a8918f567c1713dd8a4d6ba908.exe net_reactor
Files
-
43f13ec00b6df87637b5863be3ffe01fc85947a8918f567c1713dd8a4d6ba908.zip.zip
Password: infected
-
43f13ec00b6df87637b5863be3ffe01fc85947a8918f567c1713dd8a4d6ba908.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 8.4MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ