Static task
static1
Behavioral task
behavioral1
Sample
4e98921af16d88f726f89e67e42e524d5f5ca6ef489714766c452aa78709721d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4e98921af16d88f726f89e67e42e524d5f5ca6ef489714766c452aa78709721d.exe
Resource
win10v2004-20231127-en
General
-
Target
55b151f5eb325a72233de85d0fa357a0.bin
-
Size
2.9MB
-
MD5
fc64970e18f246eabf0588253a3d3bc4
-
SHA1
83e655ca521a670019379bef8c8bc031486395ab
-
SHA256
66ebcc43a489625e8d71a58e5043e75d55107a9cc99609076cb927e512ba3d62
-
SHA512
34448ff39faf6fa68d42d4ed34412086aeb4ee102cdf3fe0a81eb6896bad4ee41700c19cbc62e58f07cf390a6e13508b4f5fadc6c0a7d8518f6051413b95624b
-
SSDEEP
49152:ll7/Aa8f7GkO5xPO80uUbIX+esxK9tMUxS8AeIn+kAMXWfh/2aiQfeDDGv6:vzI7MFGq+dzpN9XWf52a/enT
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule static1/unpack001/4e98921af16d88f726f89e67e42e524d5f5ca6ef489714766c452aa78709721d.exe net_reactor
Files
-
55b151f5eb325a72233de85d0fa357a0.bin.zip
Password: infected
-
4e98921af16d88f726f89e67e42e524d5f5ca6ef489714766c452aa78709721d.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
6d:3e:11:99:42:e0:fa:b0:48:52:41:ac:c6:d3:90:32Certificate
IssuerCN=Hewlett-Packard Company /silver/Not Before18/11/2023, 19:43Not After19/11/2033, 19:43SubjectCN=Hewlett-Packard Company /silver/39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
e0:ee:f0:cd:80:f3:2b:eb:2e:82:19:bc:1a:63:13:35:d7:3f:aa:56:07:ec:a7:67:1e:20:c5:ab:37:d1:33:a9Signer
Actual PE Digeste0:ee:f0:cd:80:f3:2b:eb:2e:82:19:bc:1a:63:13:35:d7:3f:aa:56:07:ec:a7:67:1e:20:c5:ab:37:d1:33:a9Digest Algorithmsha256PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ