Behavioral task
behavioral1
Sample
8d3e8a01a81c542e1c45a5c7057960b0325241ac96eec1aed701c54df64e5298.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8d3e8a01a81c542e1c45a5c7057960b0325241ac96eec1aed701c54df64e5298.exe
Resource
win10v2004-20230220-en
General
-
Target
8d3e8a01a81c542e1c45a5c7057960b0325241ac96eec1aed701c54df64e5298.zip
-
Size
4.4MB
-
MD5
73b58e90256a3d7a1113e6656b20dcf8
-
SHA1
7dfdde5a02ba54850a4b39a7e56202b09e32ddde
-
SHA256
16de7a04a5ee57c670044bcab060887a6cb6442213d2d574854900bfb12efb98
-
SHA512
7a218157b25fbdff59e69b2e05e483cad83590cc849ce7ede1e8efb1e0f5bf3419a4b9348cf308470223762959f47cacff408235048048c8dfe36eb1c96210af
-
SSDEEP
98304:hPkFmJXMi3OHeFr09OBIWqemfm6q4sCwfnVFPTTQLN5ykCnWjNQ0vpdX:cfWpw92hBKm6q4LwtdTMJ5ykCn8NQ0DX
Malware Config
Signatures
-
Raccoon family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule static1/unpack001/8d3e8a01a81c542e1c45a5c7057960b0325241ac96eec1aed701c54df64e5298.exe net_reactor
Files
-
8d3e8a01a81c542e1c45a5c7057960b0325241ac96eec1aed701c54df64e5298.zip.zip
Password: infected
-
8d3e8a01a81c542e1c45a5c7057960b0325241ac96eec1aed701c54df64e5298.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 8.4MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ