Static task
static1
Behavioral task
behavioral1
Sample
GAC0R SHELL.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
GAC0R SHELL.exe
Resource
win10v2004-20240704-en
General
-
Target
Gac0r Exploiter.zip
-
Size
3.2MB
-
MD5
ac94de6eb2ee109859c9404d6aeaf5ad
-
SHA1
dad685a14c9e9c0d5953ab7f7c8cf77b18a6c851
-
SHA256
0e28d22a3149ef68337399d13c8f7b9b2ad0561231fb5310d9bb5ccdd4894680
-
SHA512
b0c82f25fb507b01007732499970b27baa8e14fba7d9d96633b5b39f58db1167495472ea8ef7b32d63dceaba7719ccac20b98429b6dcee3a646358b9a5adfc32
-
SSDEEP
98304:WLWHn48gZby8e7/GtWkesMm6v20uTJPceOi0:yWHn48+eCusWO0uTexh
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule static1/unpack001/GAC0R SHELL.exe net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/GAC0R SHELL.exe
Files
-
Gac0r Exploiter.zip.zip
Password: 3P0
-
4672616e7e303037.csv
-
4672616e7e303037.php
-
4672616e7e303037.txt
-
4672616e7e303037.zip.zip
Password: 3P0
-
._4672616e7e303037.php
-
GAC0R SHELL.exe.exe windows:4 windows x86 arch:x86
Password: 3P0
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ