spoofer1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2120c3f031d7fb52761ba252870d5990N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2120c3f031d7fb52761ba252870d5990N.exe
Resource
win10v2004-20240802-en
General
-
Target
2120c3f031d7fb52761ba252870d5990N
-
Size
5.1MB
-
MD5
2120c3f031d7fb52761ba252870d5990
-
SHA1
7b6806b11be12063e81d5cbe270edd23c5441998
-
SHA256
aabeec16735d0282184052fb4cd60612460f85bf4398d2ea998a7fd0d49f2288
-
SHA512
de726844fa87d66d6c7ce297cfe692131e94651fa48073d755ca19353853ca80cd3c0c97d06c4f01ac69119016bd570aaf677a5ba7239bde60491dba786d20ee
-
SSDEEP
24576:5rc8Svg5GTdeww/MRvUtyfaFVIefE4A4HXvcrZLMpsWM4RjmcPhL+HQ/jzuVMCtJ:piTq/MGuKIh+XMCa7cO8NlaVeuHF
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2120c3f031d7fb52761ba252870d5990N
Files
-
2120c3f031d7fb52761ba252870d5990N.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ