General

  • Target

    7b0d27def7d743d8a91bd89449e914d7b92b0966f0fdf768cbd6849a09532103

  • Size

    479KB

  • MD5

    b38c83cbca41829bd69a0ba9e16492b4

  • SHA1

    04b0d23d904792672921563bb5d54cf082851098

  • SHA256

    7b0d27def7d743d8a91bd89449e914d7b92b0966f0fdf768cbd6849a09532103

  • SHA512

    a27d249e86390a943d9659de22589dbeed44a74bc65683cd0e523edc0fb314ba32db8b96525f35cafd11edafec36c6c6d1be8ec31fea3d954954cc923c67a187

  • SSDEEP

    12288:CNK0REsh8bpwiCPZjfvc7UQ6OT54K51twRYklK8zSwvB1sFkrEp3:CPabpQjfnQ6OT548wR1lKsSwp1sFUY

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • 7b0d27def7d743d8a91bd89449e914d7b92b0966f0fdf768cbd6849a09532103
    .rar
  • PRODUCTS NEEDED (CN).exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections