Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 14:48
Static task
static1
General
-
Target
dotNET_Reactor/dotNET_Reactor.exe
-
Size
13.3MB
-
MD5
bd73df4cf427511993075f7a16e037a5
-
SHA1
63f116641b0655f53e93d62ae559d510ed5af134
-
SHA256
fa0a32d408a8df70ec44f3d2374b058f57b86ff49b8068b8c68f8505d3463970
-
SHA512
49ad63e65e1f6a454778c904727c948969145eb09457105093af463d933413a7d30437051c7ddb8ded0b46d38b2018a1a78c83af582ab6775bef870057a9dfc3
-
SSDEEP
393216:xfuP82nPJiP63TKZqkoPrSz4rkZD1K1fU:xqPIPgTxkqrV6YN
Malware Config
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral1/memory/4148-2-0x0000000000EE0000-0x000000000218A000-memory.dmp family_zgrat_v1 behavioral1/memory/4148-47-0x0000000000EE0000-0x000000000218A000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/4148-2-0x0000000000EE0000-0x000000000218A000-memory.dmp net_reactor behavioral1/memory/4148-47-0x0000000000EE0000-0x000000000218A000-memory.dmp net_reactor -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4148 dotNET_Reactor.exe 4148 dotNET_Reactor.exe 4148 dotNET_Reactor.exe 4148 dotNET_Reactor.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4148 dotNET_Reactor.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD5f6f470ab378c9af0cd72ee4d8f36f7a3
SHA1095cefaa8a7d119fd0a28fe2b7dcbec5379d337b
SHA256ac3608a4ba2947ef197bc12f6a6dda90e2351a6918524b0cf7b4926d47dcb36c
SHA512f0d5841b6aa7cba57107432dde1fafb31e1bca327a0a6c57c6ab8a2d606f25019c8edf2a77fbbe435ccc3f61cf72cfd9bd438f82a7f66e381fdf6c9627f5c516