offDef.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b263b44ad31166ccc4e18d59cb2d828d2d7d56b7217569f9e61e872a6de50018.exe
Resource
win7-20240215-en
General
-
Target
843aee0d628f80f585b1a250fd7a0062bcdea58704965d9187e3874b31359a6b
-
Size
31KB
-
MD5
f4108e23d5ad5b2078d04da8eafdc202
-
SHA1
083580efb74a57e7a531a76f17b40640adca6ff7
-
SHA256
843aee0d628f80f585b1a250fd7a0062bcdea58704965d9187e3874b31359a6b
-
SHA512
8dbb78181199366675ae024e5e73f6cc4ddad759a8bec1f37378e413c0fb8f97895d81569168d97bae6f37bcac7e5b91d6ceac4b737b4edd930b1b8ff8b49001
-
SSDEEP
768:Ls30rRqgUDjP32jsQ5RJt8m+jUd2MToskgKbMQVfqNMS0Zer3OHPe:Ik0fDjmjsQ5fCm+hMToskVLfqNMSdSve
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule static1/unpack001/b263b44ad31166ccc4e18d59cb2d828d2d7d56b7217569f9e61e872a6de50018.exe net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b263b44ad31166ccc4e18d59cb2d828d2d7d56b7217569f9e61e872a6de50018.exe
Files
-
843aee0d628f80f585b1a250fd7a0062bcdea58704965d9187e3874b31359a6b.zip
Password: infected
-
b263b44ad31166ccc4e18d59cb2d828d2d7d56b7217569f9e61e872a6de50018.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ