General

  • Target

    Payload2023.exe

  • Size

    605KB

  • MD5

    df23c78198f2eafcf23fc5994ccaf8ea

  • SHA1

    8e5e0f6610290b5f2ec8723460f27b9bd27d9111

  • SHA256

    df5c5c2524398135267930eb489cd186d082f517163a94b3d9c50ed50c27bfd4

  • SHA512

    eadb5013e3095e69bccac7ba8187d22db033daa30aa5424606266436f004ba5e8806bb42133927da2b3ff9a0574e2baed7ea7f2f77779a995274fbf49ddc0b6a

  • SSDEEP

    6144:pYrROLvZh3T1EGTHLqCRXVUpsGWwvU4iFlZ9JzqloHxzNjp4b9T1TXrzq/sUsE4H:mUpjvp3DxqloHxtpc9TZiN4rFdR9

Score
9/10

Malware Config

Signatures

  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

Files

  • Payload2023.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections