General

  • Target

    8577d539f08c0151f39ae14b00f0c87d27da6fa49de660b2c67377b6cf0c0c8a

  • Size

    164KB

  • MD5

    f966d3734e6f2f838349d0cd77e1f61f

  • SHA1

    dce405ddfccd4226f3be83549c9951eab41849a1

  • SHA256

    8577d539f08c0151f39ae14b00f0c87d27da6fa49de660b2c67377b6cf0c0c8a

  • SHA512

    fbe2e3a96feaa7572967a9ea7643a6fb69ab33158b2fa526d3bee7d4cbec34bd7dd22743ba8e1b09d467ceeace912cd841173b22db103e19e698589b70e632b6

  • SSDEEP

    3072:RFhOe32zZf4zKo3rmGcVOeX6NKHKgVS1QEi4sPKF1AaG4ANag+wP:kHzZf4zKo3qIC6NP7finCSaxFwP

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • 8577d539f08c0151f39ae14b00f0c87d27da6fa49de660b2c67377b6cf0c0c8a
    .zip
  • updtd-paymentcopy.xls.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections