General

  • Target

    disk spoofer.exe

  • Size

    1.8MB

  • MD5

    d9a7b316d0ab2fd033a72d9e6b84a0c8

  • SHA1

    092a1762591881cfa220e365d22321ff61372d15

  • SHA256

    a6f8b70bb50e5d91840cef3d06013c31635790261ffde6b08b73f750a362fe05

  • SHA512

    e803f889a10d0feee786bccc799b16eb9e852dee11d7469829acb85950e989dd8e66cdb4abd648aad86c56257a4502a6153eed02d6ca23b53db371528253db78

  • SSDEEP

    24576:RB0gQATOMw3zMTMNNd+g5Wk78GBBjgrIQtD3KXHK+FutZbJcMFumJIUXY:An4jgxBBjHQtDaXH98O

Score
7/10

Malware Config

Signatures

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • disk spoofer.exe
    .exe windows:6 windows x64 arch:x64

    6a91eb82bfd19d2706c7d43c46f7064e


    Headers

    Imports

    Sections