General

  • Target

    09_7d44bd7d83dace54b68f93ef16b7a70173dc9ccf

  • Size

    180KB

  • MD5

    5888013d8ed73ad7f59d11d8a191390f

  • SHA1

    4c6dff0f5ec5e20c6831de4764b2998e33be19cc

  • SHA256

    b37533b42dd24cc7efb7b1c4c71a70dac1a70623026e6c49dc50857b9e1f585c

  • SHA512

    83abafb5bf4cbc061a30bfa69dcaffc84f81a86f71446d5af989bd42585ad6d4d39ec279f43d41e7275e4557cd383f93be86f2d13fcf9e1287cae8470c4c2fbf

  • SSDEEP

    3072:c64PPeGgoWGtkTieoEAhFgS1yrN4XbmF4pT0bzQ7rYDBppR+2OWH5xMoiW2oyI1i:c64PWjokTieTwgAyryXbO4FIErYK2OW4

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 09_7d44bd7d83dace54b68f93ef16b7a70173dc9ccf
    .zip

    Password: India@2023@@

  • Device/HarddiskVolume7/imaginaryC2-master/examples/use-case-9-zloader/zloader-imaginary-c2/server_data/09_7d44bd7d83dace54b68f93ef16b7a70173dc9ccf
    .dll windows:4 windows x86 arch:x86

    Password: India@2023@@


    Headers

    Sections

  • manifest.json