General

  • Target

    0d42033f98bb08e92b5e0e10b6bdc2674689efbbe4fb275c74b85262a5da68cc

  • Size

    395KB

  • MD5

    76accd6e619502ec22b9928a2353af9a

  • SHA1

    460042b0da7494957c29dff5a8b90b1a792b80e8

  • SHA256

    0d42033f98bb08e92b5e0e10b6bdc2674689efbbe4fb275c74b85262a5da68cc

  • SHA512

    c68e09faf8bfae69102794f125eddf041b73517cec2f1c2a3e796823d7409c2aaaa99b7280b7774bd1146ab08d87ebb373a34e57f433e189a6263622d8200c2c

  • SSDEEP

    12288:m586JYZrBEsq8Ez00JU9qYQtXQ++8FDK0:m5RJSEPz00JgxQtXQzGT

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • 0d42033f98bb08e92b5e0e10b6bdc2674689efbbe4fb275c74b85262a5da68cc
    .rar
  • Payment notification.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections