General

  • Target

    f1e4fd001ddab683c7aa0e2b032e32c880fc74217d28a8f05888b9c56cf01e06

  • Size

    803KB

  • MD5

    4bd4c303e2e3f0f62ec210c3e525c0c1

  • SHA1

    126703fc06fa113a28ad62f90bb3566f4755be30

  • SHA256

    f1e4fd001ddab683c7aa0e2b032e32c880fc74217d28a8f05888b9c56cf01e06

  • SHA512

    59221730e77663ecc7b95631e1446a9f5694082563c800d9fe076564999c17d744067012fe8fcf653a99d61d14e22f3e20ebe4eeb9afd4ac53985a02efe23383

  • SSDEEP

    12288:XCaoc6jKQjIe5uiRqbTGH6epH4/RwWbKzORAg+KOlho8oDn0hhBN046YTcJ:yav6jKQjfAvQLY/Rw9z+Qblh0D0hhjTM

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • f1e4fd001ddab683c7aa0e2b032e32c880fc74217d28a8f05888b9c56cf01e06
    .rar
  • QUOTATION.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections