Static task
static1
Behavioral task
behavioral1
Sample
RexonPAID_crackedbyezerovr.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
RexonPAID_crackedbyezerovr.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
RexonPAID_crackedbyezerovr.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
RexonPAID_crackedbyezerovr.dll
Resource
win11-20240412-en
General
-
Target
RexonPAID_crackedbyezerovr.dll
-
Size
3.8MB
-
MD5
aac534d5d33f0446800ecbe8adbfb4f8
-
SHA1
00d180e881cb6f8bd7d8a3723ac9c7fc4f57495b
-
SHA256
4bc6f389763b39ed258cc8c9adb19a9fda1733679ff5be6061ef87012b5ada96
-
SHA512
8223be5d2e49fc12faad1cab71696fc4d4ea2d6b55f0b4e989903e874f929eae49181adfcaf04b55039aa459dc5c8ad36df8f7c2609fef007073508b1522d652
-
SSDEEP
98304:xpk7ztmQduPF9CEI/8lnhIkgp78SJ5R7TE8HJK/cQj9fzGaD4R:xpk7zcQdiF9CEI/8lnhIkgp78S7R7TEZ
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RexonPAID_crackedbyezerovr.dll
Files
-
RexonPAID_crackedbyezerovr.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ