Static task
static1
Behavioral task
behavioral1
Sample
667bd85d957124ab909987434bad3a62.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
667bd85d957124ab909987434bad3a62.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
667bd85d957124ab909987434bad3a62.exe
-
Size
814KB
-
MD5
667bd85d957124ab909987434bad3a62
-
SHA1
48f5ff1c43ab6ed28f59dcf9b10d4515922201f2
-
SHA256
7559061a4b412f6249a6dd96889eecac890e2f7a3d1a2ea9bcf611feb26bf7d2
-
SHA512
4ce39e69483fbad186313ab5bd26cc15a068ce8c1785e78a995ba92299c5b191cfde53dc55e1de50318f91fb74a2b800970d5292c249f738531b60a9ecdab2b2
Score
9/10
Malware Config
Signatures
-
CoreCCC Packer 1 IoCs
Detects CoreCCC packer used to load .NET malware.
Processes:
resource yara_rule sample coreccc
Files
-
667bd85d957124ab909987434bad3a62.exe.exe windows x86