Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp
-
Size
4.8MB
-
MD5
ce8c6291491b42239845750ab6d3cef3
-
SHA1
cfd21f56a8dbd9fcff19aa9bc2ad60ce5ef5a23a
-
SHA256
2297ce6bc64574cf2ced1358d8791019bb1a566d0e31600fc9188aa5a9dd0f97
-
SHA512
c1e682809036ed2eb3f386bcc748ab8c00144fc8e8ad0a8e04fbcfaefae2ba9589189a81d2a3e3f44e24f0ef793260b062757b8004638232e94025d0f848843f
-
SSDEEP
49152:q1ygDBY/LthXGp8mih7NUfXUu4tEqNrqcqapPeDkwVzMemuYTwBFxI5eGh:awG/Mul2rq/aReDkizMeQUUFh
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ