General

  • Target

    femto_Slave_v1.73.zip

  • Size

    3.4MB

  • MD5

    b1cbbf4475e3c757de34fb15b98c3645

  • SHA1

    d4ce2482b6193700275f68a2284c34bbca8dbd05

  • SHA256

    c12320a1e1fc40e9c7af6cd7dc8a40cb91fdc32dea24b6f1c552d64b1956517d

  • SHA512

    d73944c32c503b242a768c30aa9d5b0db880b992286adec6af85d4f95cc1e3c35bd266c116e6be28a73863835adddef40f75ee4393628e2114a8b4ec4bc7e991

  • SSDEEP

    98304:zgWfwwNmzVCOLglsNQFOzdVeCbbGGhzRqb1jee49FG:1HytLgGNQiSCbbFqR/oFG

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

Files

  • femto_Slave_v1.73.zip
    .zip
  • femto.Runtime.dll
    .dll windows x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • femto.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections