Static task
static1
Behavioral task
behavioral1
Sample
af4586015e689d670854702df4aa5748eb90da472dc6c479f065bfb49e624d0c.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
af4586015e689d670854702df4aa5748eb90da472dc6c479f065bfb49e624d0c.exe
Resource
win10v20201028
General
-
Target
af4586015e689d670854702df4aa5748eb90da472dc6c479f065bfb49e624d0c.exe
-
Size
256KB
-
MD5
fe562bb60356ea0885d298fee6e0772a
-
SHA1
b4febb6af54c4ddc31fb821159528e2257367ca1
-
SHA256
af4586015e689d670854702df4aa5748eb90da472dc6c479f065bfb49e624d0c
-
SHA512
265d3f7b0296195430e7d0edd1102e3318136734846e5e409421518cc0f72ee563cc9f2a71d1ddd3b4feeab0a20f212b853c7174e7a86cfc979fa7cbfdf3552f
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net
Files
-
af4586015e689d670854702df4aa5748eb90da472dc6c479f065bfb49e624d0c.exe.exe windows x86