Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20240221-en
General
-
Target
spoofer.exe
-
Size
4.3MB
-
MD5
aa195ff4c8bb73920c20e4ed7677dae9
-
SHA1
69a94554afbe03fad3a5916e8958c7fd02b646f9
-
SHA256
a3f281f814b5d0bf371681f28bd3d450c03636cd1fd98790f14ba874f4506743
-
SHA512
6fb003ae56a7565ff9545831105e64689eab5ca9c99c419589677f06bbc1f5a161a151eb7740f0cc12af97e8040cebda99d1312064e6781751676b9a330f455c
-
SSDEEP
49152:Q94KvqXN2eU+Ecl36t9NIf4PO6yrxyyew6d4HLlPhlDUl28Vq2HBUIWz9A0nnmGe:Q0XMUEcVO9NHPOhEyeihlSLBUIqML
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource spoofer.exe
Files
-
spoofer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ