General

  • Target

    ba9056d8017e211407a8915ae3d0132a18c7af6a380c7dd53f6521c5f8bb5af1

  • Size

    785KB

  • MD5

    b48c180451a952d25f314c446b9e1f6a

  • SHA1

    7cc47f4543549148dcbb698af42ced0730e3e811

  • SHA256

    ba9056d8017e211407a8915ae3d0132a18c7af6a380c7dd53f6521c5f8bb5af1

  • SHA512

    4bedd4c3fd4e164c1b372f4ec3a053a9e420cd9a51e597fea0164d9d8eea5a25cc290ce2aaf34bd19dca49afb8b2fe09aff80171cff2c1ecbb9fea464d4652a2

  • SSDEEP

    12288:tNll0Ly/Dkfu2oQndYyelZQbODkGxqk/sMxduhdzJwPhQTD1e31q5qU+6RmNWJ:tNaPDndAkbikbk/jjuH9gaf1e4dgMJ

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • ba9056d8017e211407a8915ae3d0132a18c7af6a380c7dd53f6521c5f8bb5af1
    .zip
  • New Offer.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections