General

  • Target

    cf6e3f0ce8b1a59ec6505147e394a273eb55f7c987faec8824001419ac4e807e

  • Size

    402KB

  • MD5

    7fc89d78e0ab8903852e3bd1e97ca247

  • SHA1

    fd7c05f6b2bf7ea4d4af855941edda80ed705f10

  • SHA256

    cf6e3f0ce8b1a59ec6505147e394a273eb55f7c987faec8824001419ac4e807e

  • SHA512

    86a006cdf5205e02c915ad3b6736b3c093501401d463075c74ec4a3ef413415f12ab71a0d58fcf23674f3c613248771fb9a6097a9b5913a3655e02c051d5392a

  • SSDEEP

    12288:OSWYOXg9te/2t8PJZ08oA4bY3KOX3osb12VbwgnTf:jWYOXH+8PJZ0jA0Y3KK12Zbr

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • cf6e3f0ce8b1a59ec6505147e394a273eb55f7c987faec8824001419ac4e807e
    .rar
  • Inquiry.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections