General

  • Target

    f8f829521ff957ce0b2343426fa96d6f7252ca162f3c264702bccf5b624dc52c

  • Size

    401KB

  • MD5

    3693d005713308b3f1a77f9e060167f8

  • SHA1

    e033cbd74f937f96925a0f2ff2b29fbda010e85e

  • SHA256

    f8f829521ff957ce0b2343426fa96d6f7252ca162f3c264702bccf5b624dc52c

  • SHA512

    2f90374973393c7d5a616de1c8c1d29f4c51c27d4ce7ea9f8b3186e75c32acb50b57b0e6f86c0e196c59018f356540d38b7bad070e7b8f06295e8e58202b035a

  • SSDEEP

    6144:KmPrCtVUqyg2B/jzOg/R6CjRBVxLHY6+8QQ+p9+AdjG9QgGhxznsXn7yX+pa:8tB2Bt6EnY6fg+b9QPzyn7c+pa

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • f8f829521ff957ce0b2343426fa96d6f7252ca162f3c264702bccf5b624dc52c
    .zip
  • RFQ - L2004220045.bat
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections