General

  • Target

    a387eda9019c925849747107987f8e232b8c0da6f1f40dccec3eb525cc35d051

  • Size

    803KB

  • MD5

    34b80396d558910fae81a63dde7eb3df

  • SHA1

    3083f5fd4cefd79ba80aadad04320d148743eb11

  • SHA256

    a387eda9019c925849747107987f8e232b8c0da6f1f40dccec3eb525cc35d051

  • SHA512

    0b5fd74b2a0e43f5d61520d5d8d1086c66dfdf10e61dfa40cdad718cedf33c7c61e8d71cdfcfec386b97e9e76576fe2c6c1f77645d6098743395a5d72bcbfa27

  • SSDEEP

    24576:1u0Pc6eGcAtTtaDCKaF0ZpcS9xASgDhZW/ir06ib:1uEBLcAtTtECKaFrSCDu/g0rb

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • a387eda9019c925849747107987f8e232b8c0da6f1f40dccec3eb525cc35d051
    .rar
  • RjJZqTyRrEpvftP.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections