picturefonts.pdb
Static task
static1
Behavioral task
behavioral1
Sample
319d1dc217b7e83a85dd62cb2c066156ba5579087f11c991a99089606979ca28.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
319d1dc217b7e83a85dd62cb2c066156ba5579087f11c991a99089606979ca28.exe
Resource
win10v2004-20240802-en
General
-
Target
269a751b0c6d68cc39b2267c1592dae2.bin
-
Size
8.2MB
-
MD5
21c6b0ddbfa2389cb73eaffe8a47caa6
-
SHA1
d03730c43d8b967b4cc29f99a3d8e85ba6c88aa7
-
SHA256
7883958926650b114e20b42ce25ec03b1133ec1e50f9277fcf0aea89cf9c1b0c
-
SHA512
1ee107dcc83c3e97ef0bbc2cab6817a0049e5a4027a5337ae64896475254a20f1d5f8136bfe5d3135749c508fbdbd14e589fe4d689bcafab48b03f98e973c664
-
SSDEEP
196608:hdVgGaRVtAQG+dkAC7FBpRDGL4TqNhDu8bYTs69p/rEI88nVV/VO:hSSRwuSL+q/aMITb88RO
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule static1/unpack001/319d1dc217b7e83a85dd62cb2c066156ba5579087f11c991a99089606979ca28.exe net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/319d1dc217b7e83a85dd62cb2c066156ba5579087f11c991a99089606979ca28.exe
Files
-
269a751b0c6d68cc39b2267c1592dae2.bin.zip
Password: infected
-
319d1dc217b7e83a85dd62cb2c066156ba5579087f11c991a99089606979ca28.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 12.0MB - Virtual size: 12.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ