Static task
static1
General
-
Target
RexonPAID (1).dll
-
Size
7.5MB
-
MD5
548662eeccdf3e933895c3194223fa1d
-
SHA1
40b02b007b9a1a9ba7deab08aef983de4ed78a61
-
SHA256
0633e30a3eb7ab6842ff745f7d628a89defdad50e0219d483e3abe8c9e520601
-
SHA512
9f4b3ef3b9e93cac119dcf7fbd02e9c45d82e51f290063ef3a796808a5b4e5b643f36b54349073daf67d813661cc5d28348ba7eb4eae51aec3a56c23cfc4e75b
-
SSDEEP
196608:hcvzCz+jLJH+garDs0DDylg1t8HJqUweD/WY35ZwzDejXxaSpegvoVGLMPvLpBW+:hKCzYB+garoTDuY34zoawGvLpBWx
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RexonPAID (1).dll
Files
-
RexonPAID (1).dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 7.5MB - Virtual size: 7.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ