Resubmissions
03-09-2021 08:44
210903-knkchscgf9 902-09-2021 11:39
210902-5qmqtqgzvs 916-07-2021 08:05
210716-56b3g8kfte 10Analysis
-
max time kernel
298s -
max time network
369s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
03-09-2021 08:44
Static task
static1
Behavioral task
behavioral1
Sample
96d4ecbc8b4e168039901376fc5a8b5a.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
96d4ecbc8b4e168039901376fc5a8b5a.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
96d4ecbc8b4e168039901376fc5a8b5a.exe
-
Size
3.2MB
-
MD5
96d4ecbc8b4e168039901376fc5a8b5a
-
SHA1
133d86495e1b248253280bb10a24da1045a75594
-
SHA256
cfdb155368f72aed83e715260f1dd63922a25ce4e6d558941f94cb4a06357994
-
SHA512
b6d17596374d88b33e2331687ed70f85add4331d2d7b612a3da44907a79f356e619654378d327889e50e9908e86b96132c3bf395dff1a9f91ea2c3a536bc3c2f
Score
9/10
Malware Config
Signatures
-
Core1 .NET packer 1 IoCs
Detects packer/loader used by .NET malware.
resource yara_rule behavioral2/memory/664-119-0x000000001DEE0000-0x000000001E390000-memory.dmp Core1