General

  • Target

    5dbc56add4738f555a48c4d1e8f9b773421c6881fed842b32c8866943458a17f

  • Size

    268KB

  • MD5

    a00b302e17a459995db7f6e73335f82e

  • SHA1

    bfba7653638188d6e5f988bda3e253ee38baec26

  • SHA256

    5dbc56add4738f555a48c4d1e8f9b773421c6881fed842b32c8866943458a17f

  • SHA512

    2c50fc5ebde7810e9f64a6d4b14704f75cf34cdd74e633ce2a05696cbb1792f2fd8731cd295d8975105f73f92298587814c03048434d2c8aae78c297b96c624d

  • SSDEEP

    6144:i2mHsC0eXY3tnkNGy78Xoz5QjJSQOh6OSwM:MsHeXAkP78Yz5ecM

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • 5dbc56add4738f555a48c4d1e8f9b773421c6881fed842b32c8866943458a17f
    .zip
  • Order InQuiry.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections