Static task
static1
Behavioral task
behavioral1
Sample
f540b9fdb27c1e9e6c0c05a2c020044a.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f540b9fdb27c1e9e6c0c05a2c020044a.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
f540b9fdb27c1e9e6c0c05a2c020044a.exe
-
Size
863KB
-
MD5
f540b9fdb27c1e9e6c0c05a2c020044a
-
SHA1
ee4070cec57f16884fc511ee4a5b61d06585c6aa
-
SHA256
a2c284a50d4fc05794e3bce123492bd9e547b272d9f7b87832fdc72b681580e7
-
SHA512
101791d8c003b446f5f92b9186026a549993dd654e334e11dc41e92a232c49df7df83f232c96106fb7d6e94f8ced59a1165c4afe88c5bdec8a3f7a6bc462fd17
Score
9/10
Malware Config
Signatures
-
CoreCCC Packer 1 IoCs
Detects CoreCCC packer used to load .NET malware.
Processes:
resource yara_rule sample coreccc
Files
-
f540b9fdb27c1e9e6c0c05a2c020044a.exe.exe windows x86