General

  • Target

    3ff584e04fd6e89be210bbe78735f59e27e2b374294ef5682598f0b3454ff6fe

  • Size

    390KB

  • MD5

    6d9502660720cc2bd4bceef19be55f6e

  • SHA1

    8a180788b066018a899cfabf9864856037ee4ee2

  • SHA256

    3ff584e04fd6e89be210bbe78735f59e27e2b374294ef5682598f0b3454ff6fe

  • SHA512

    7d2205fa24484aca19e60084e8f7708de9aae504abb4a084b9c42e660c36238155b1874d68c944f1fea93e2afdfa39d9bd268d8570551b648a8088f6a40b8007

  • SSDEEP

    12288:loST4uF5+hS1TTptmhDFFuQ1grGR55UoQut:LFgcV9tmnWrGRXxBt

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • 3ff584e04fd6e89be210bbe78735f59e27e2b374294ef5682598f0b3454ff6fe
    .zip
  • PO 28602....A6hBbL7xL4Jle4w.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections