General

  • Target

    2a69f324a5524c24e3280c7d6e573ee0854ae8a6e12efe42f1c8cea50999ba74.zip

  • Size

    26.3MB

  • MD5

    a051137bf97fd34edbd1a7975d2deef8

  • SHA1

    a90420d3961176cb06b32c2e0ea06a8156702767

  • SHA256

    2a69f324a5524c24e3280c7d6e573ee0854ae8a6e12efe42f1c8cea50999ba74

  • SHA512

    9c4cf1386974f32accaa65cc6dcd7e810b459a80b67b2e323719b0123ecd4868508b8d8e06caa9b935294cbdf88ed88f6794bdc324c44f13f0310c44b22ce3b2

  • SSDEEP

    393216:/VEsG0s5H3Q9ExQI17Y2jc+KTwsNN0Fdic3n3ur22KLiGqt1kVAeN7aKC1:esG0syEGI17Yj+KTwK4n3O2kp1oAX

Malware Config

Signatures

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • 2a69f324a5524c24e3280c7d6e573ee0854ae8a6e12efe42f1c8cea50999ba74.zip
    .zip

    Password: infected

  • frhasdtr.exe
    .exe windows:6 windows x86 arch:x86

    Password: infected

    4b9672a3e67e1ab9c37a2368f7cec338


    Headers

    Imports

    Sections

  • lumma.exe
    .exe windows:5 windows x64 arch:x64

    Password: infected

    b1c5b1beabd90d9fdabd1df0779ea832


    Headers

    Imports

    Sections

  • picturefonts.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • rundll.exe
    .exe windows:4 windows x64 arch:x64

    Password: infected

    d7f472598963ebaa7c80a096cf26c5f8


    Headers

    Imports

    Sections

  • setup.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    bdaa4f11fa75ae7944b223ba584c1f57


    Headers

    Imports

    Sections

  • DDRI.pyc