General

  • Target

    R2R.7z

  • Size

    1.4MB

  • MD5

    92e98aaff76f08601bcb7c10f8a3aa08

  • SHA1

    df323302fcc75376b25738db31ffff6f6562c67c

  • SHA256

    204ea37dfaa7019cf31b6c5bb5283d042d611f4e50a95f5caa0b4bca4bd19ecf

  • SHA512

    05aa5815d65ff4c8f64f5a944214a43955fb76e40404c12bf8c2abeac04a7e3370583c416f2327a3a563f819d6ecc8ae580168274ef0e68f78537394de44ef3c

  • SSDEEP

    24576:7oxzfHl+BAeST5CDShQ5RL+YMc+ndPuDphdFJcfxFq22EVpzD6haPU8ozpu04MBp:2f8iNEDSq5RL+YsGDDWfzXTVJD60U8oF

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • R2R.7z
    .7z

    Password: Fucktards

  • R2R/Kontakt_Keygen.exe
    .exe windows:4 windows x86

    Password: Fucktards

    61259b55b8912888e90f516ca08dc514


    Headers

    Imports

    Sections

  • R2R/NativeAccess_XML_2023-09-13/NativeAccess.xml
    .xml
  • R2R/R2R.txt