General

  • Target

    0f16edd83d20fd6f3919eb95be613a515548de4d5b1785d056b119ef26598c33

  • Size

    494KB

  • MD5

    df68fbfc6a2211bcf0bebd9b9a673866

  • SHA1

    b796e9972d14077aa0c0ce7d398a321fae254757

  • SHA256

    0f16edd83d20fd6f3919eb95be613a515548de4d5b1785d056b119ef26598c33

  • SHA512

    40d2d9f165fafffe24751fdda0ae04b5a55cc62edadc999f99470ea0a0ac71595e0b2a274ecdcd80acd4dfc34889cd3270a7ae03c02e9633f6c18089ab062fe2

  • SSDEEP

    12288:iZd0O4vuzUp+gwGYk+9RF6YB82vddRoOn:izb4vkUQg7T+vF6i82TiO

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 2 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • 0f16edd83d20fd6f3919eb95be613a515548de4d5b1785d056b119ef26598c33
    .iso
  • reciept,pdf.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections