General

  • Target

    f0dff210f8c759c52bea75aaae8b8c2b3c830f65b354ddfb12537133bdb32adc

  • Size

    1.2MB

  • MD5

    48dc0b86a040ca7beeaeb7b25376bb5c

  • SHA1

    77ea9339f3265de30341cc489d9990f15720fd51

  • SHA256

    f0dff210f8c759c52bea75aaae8b8c2b3c830f65b354ddfb12537133bdb32adc

  • SHA512

    d254592956b62fcf494f7b077d7c0c70684f400897dfde8c71abece5b6897494a33479638be15391e157c4f602f2ebe100da6f96a7e0684909309bce0bc1155c

  • SSDEEP

    12288:QVDSbXJFl+yQ5Fm5YHxNgNIAmByw664QHc:QVDSbX94FpHxuNINvn4Yc

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 2 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • f0dff210f8c759c52bea75aaae8b8c2b3c830f65b354ddfb12537133bdb32adc
    .iso
  • PAYMENT_.EXE
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections