General

  • Target

    4a0384c09149fa03c20cb45ac1d5175e9ac750826fab1e4f4fd8a5c16a0d958e

  • Size

    454KB

  • MD5

    02bd38abfe6c9e8c842308bef8ae82a8

  • SHA1

    9ccff3a42fc8d175c3bfe3c965a5813ffa888923

  • SHA256

    4a0384c09149fa03c20cb45ac1d5175e9ac750826fab1e4f4fd8a5c16a0d958e

  • SHA512

    4542b78346d0dd836c95f22765531a3304bd604fdb7408ddd3c03e5da4bb14ecdf8e948e7f837b8d0e9d51cc6362fd8c9fe3de90521e3afd3a198547aa5507d4

  • SSDEEP

    12288:fIWlIc4I3RKPYKIwgy4GmXZaylN3K8KFypkq:f9Ic4tt5gn7JpK8KFyC

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • 4a0384c09149fa03c20cb45ac1d5175e9ac750826fab1e4f4fd8a5c16a0d958e
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections