widget_stickers_in_color.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5cd13e830ecb34ff0e2c6724fd992894877b9f90e9c372ea33b838463aee9127.exe
Resource
win7-20231215-en
General
-
Target
5cd13e830ecb34ff0e2c6724fd992894877b9f90e9c372ea33b838463aee9127
-
Size
5.3MB
-
MD5
c061ee503a3a26e98864cbe5fb3bba7f
-
SHA1
45fc9f8e65345a52ebbb0e0b5c56df12ac26c484
-
SHA256
5cd13e830ecb34ff0e2c6724fd992894877b9f90e9c372ea33b838463aee9127
-
SHA512
d9c2a6c6ca94e7e8cca798efc5f8cbc54d119d0b5826821d2e9aaf97adb45c40e56c910d3e8a56bd645f280447f53230ed75d8f9f1ddf427800965d11c88cdc2
-
SSDEEP
49152:3Pnj/FthdIkv33TN4L1RMsPNrlgrGWkUXDFlJbzew5urGnJlTH+Wt3tyEWrLhlFp:3PjRnSSwszFlJbzT1eWTyEShniy4Q5
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cd13e830ecb34ff0e2c6724fd992894877b9f90e9c372ea33b838463aee9127
Files
-
5cd13e830ecb34ff0e2c6724fd992894877b9f90e9c372ea33b838463aee9127.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ