Nebula Spoofer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Nebula Spoofer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Nebula Spoofer.exe
Resource
win10v2004-20240709-en
General
-
Target
Nebula Spoofer.dll
-
Size
492KB
-
MD5
bcbdc3b868122772457e8a1091f247b5
-
SHA1
b4a7da25eda6efc60e2e725c46f259209eb61560
-
SHA256
b303d4c52bbcf7510418bca0195717539341bcbc6ef269614b85e25a4bafc9f3
-
SHA512
6ecdbecb7859385921799e0219a4d8107821af060f16c963814f4e0069e6c2de170713ebee22113823595b2b398ea84fb22b87a2acb52acf63e84da937f95745
-
SSDEEP
12288:i6ey0iwAtJqxo+nUwXMigjm6Dao20BHVnFPI4:/eyT9wXziPVlNI4
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Nebula Spoofer.dll
Files
-
Nebula Spoofer.dll.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 487KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE