General

  • Target

    disk spoofer.exe

  • Size

    841KB

  • MD5

    e0234b0124913ff987332a30daf9c8aa

  • SHA1

    932c901ed2c80ab3fa5c4d20c908a3901736947c

  • SHA256

    1539c445b9a5e409cdd483bbdd41b682d43966ff4c9811b2c9294ff17c964ef2

  • SHA512

    1379979eb49cb0c5df93ca4855026e69a917292691e0bd1aeb483f34d7f27b909d9ecfc7c23e027f0d1a0855fce7a3780bcd6e8412646ae6945fbe693e1a3946

  • SSDEEP

    12288:B1YPOSYOiTn2Tqu+Ox6VPWLV2rqbZAWPKlzQsaOBuv/yVbZu3907mPE7dgRw:GYOisUVPWLmqVASKhQsuv4g3e7+muRw

Score
7/10

Malware Config

Signatures

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • disk spoofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections