Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win7-20240903-en
General
-
Target
Nexol.zip
-
Size
363KB
-
MD5
a3191414fe7f2113b05ce279ed66ac93
-
SHA1
6723409a245ddcfd12bd52164809aee52a046e2f
-
SHA256
7068348e72d1c5fc809cbe89f2be6a51459e8861c99dff71b18dbc7cde35c2ee
-
SHA512
4ed196bc80aa51c325d98a7e3c926e4dc2e5abe834994f75efe78f3fda6d6b46822d19ffd1fb24233ec2f4c5e560e8dc2d68188fa7e70869ed9646ee5045e1ce
-
SSDEEP
6144:s6Bl+AZSVH2eCMRdbwY/6U93uZEqRZyQmj3khxPb61yV4MW8guHOmvOX7LRiTNE:1XBCnVRdsYP1uZOAbW84kguHLORia
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule static1/unpack001/Nexol.exe net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Nexol.exe
Files
-
Nexol.zip.zip
-
Nexol.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE