General

  • Target

    f1a015c0d8f30aecac2e32e83bc6ad3e1236d3ba709255cb023a740e3fc45483

  • Size

    93KB

  • MD5

    00161aff7e341a7049d1011270c43211

  • SHA1

    f8d4d89c7245fb6f47bf3dfc14197a97b15f3bcf

  • SHA256

    f1a015c0d8f30aecac2e32e83bc6ad3e1236d3ba709255cb023a740e3fc45483

  • SHA512

    18631006d93732182253dfadfba1328172a424b00978072b8345f8351a1cff3f9752ad6db40178f459b937ce524265fba3a6c2a836dbdc3aa206d9a87b43cb0d

  • SSDEEP

    1536:wJjFjG6BqVDSbXQGWsBKUOpANyzVsXVeQmSNIw04bHSJHQlJe134oJwqOX/98oLE:wJjFjG6BqVDSbXQGWscUOpANVIbWSJ0o

Score
9/10

Malware Config

Signatures

  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

Files

  • f1a015c0d8f30aecac2e32e83bc6ad3e1236d3ba709255cb023a740e3fc45483
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections