Static task
static1
Behavioral task
behavioral1
Sample
d18d56376c20fdc8504567c79055654278da9bfbea33aef2159af126247c5ced.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
d18d56376c20fdc8504567c79055654278da9bfbea33aef2159af126247c5ced
-
Size
396KB
-
MD5
9877b157ae0bcd3feb87ccfef4253491
-
SHA1
a003d7ced4aa5ea3001439b6e2cd8ae9c96d1703
-
SHA256
d18d56376c20fdc8504567c79055654278da9bfbea33aef2159af126247c5ced
-
SHA512
2067a09d2be11bb006cc6a2c4a509e1ded3491c06fab8a81d3d3eb67420fba1fca4853d819eec1d4fad9d2553c66c87217a2ddb3e270476ee3f9e375132215bd
Score
7/10
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net
Files
-
d18d56376c20fdc8504567c79055654278da9bfbea33aef2159af126247c5ced.exe windows x86