Static task
static1
Behavioral task
behavioral1
Sample
2e37320ed43e99835caa1b851e963ebbf153f16cbe395f259bd2200d14c7b775.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2e37320ed43e99835caa1b851e963ebbf153f16cbe395f259bd2200d14c7b775.exe
Resource
win10v2004-20230220-en
General
-
Target
10173369165.zip
-
Size
64KB
-
MD5
9b2ae46c0b0ae52e32c2c1d6ca290f04
-
SHA1
72cc521b2bedb709a335d072aa70eb8a2f676c79
-
SHA256
4fdf2383451b3064e96e001d95144ea54efe41d0fcd9758cab9f85b1c1495cff
-
SHA512
044562b8d37f64948d74ded847da733b2f236fc65562f2c054e7ed706fa8829affb5a0bf6c5811d88f583b02f9417bf33ebde3a86e7b334be1738649dee9c97e
-
SSDEEP
1536:5bEYyeb/PHb67Cgl5fcPNlF76TZGAlkHl4Tb+Pt0KS0ITto:5bEcPHb67/5C/56TVlkHGCHcO
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule static1/unpack001/2e37320ed43e99835caa1b851e963ebbf153f16cbe395f259bd2200d14c7b775 net_reactor
Files
-
10173369165.zip.zip
Password: infected
-
2e37320ed43e99835caa1b851e963ebbf153f16cbe395f259bd2200d14c7b775.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ