General

  • Target

    LazyAIO.zip

  • Size

    10.9MB

  • MD5

    d343ed918a5d3a4f60651101a1844efc

  • SHA1

    64610a0aa9fa5093a37e7a4dc5141256afb963ff

  • SHA256

    9c190b50fd860c35aa0feb917cc896fdaafaffbc3f3b2f13c4aa87f02c027b09

  • SHA512

    06df5b518291d7821ec2a21047799a3ed25db2555282ffbe8e1b929e6534430cdb79fc6f78ab5d4ee420090dc9f498f239d1e7d4b22ca8c790828519edb6ca2a

  • SSDEEP

    196608:p8n5yLwEK1pFzQAifiu8PncPyn6fLwEK1pFzQAifiu8PncPlGHj:pWxEK13QsYA7EK13QsY8D

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • LazyAIO.zip
    .zip
  • LazyAIO/Lazy.json
  • LazyAIO/LazyAIO Cracked.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • LazyAIO/LazyAIO Cracked2.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • LazyAIO/Leaf.xNet.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • LazyAIO/key.cto