General

  • Target

    10c6429825adaba12c34696a8ff00879b2abbb88.rl

  • Size

    254KB

  • MD5

    ab5050f0b4b71352722a6122c8107f83

  • SHA1

    10c6429825adaba12c34696a8ff00879b2abbb88

  • SHA256

    7da5b2207cf789cf6807b6cc3373048cbc951d7fd09ca8fb858693cfa5f5edba

  • SHA512

    ad2608ab646b697504286a909b1f3f454195ba527baa3a27f293f74464a0ca81aac635251f9c8cda2cf9f08650377026f5f7d1fddaa21f4573938c0f2671b8d0

  • SSDEEP

    6144:QQLFhcSHzlojz8oz64NGsj7y78a/YstUX:1FaSRcWCGJz/tW

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 2 IoCs

Files

  • 10c6429825adaba12c34696a8ff00879b2abbb88.rl
    .exe windows:4 windows x86 arch:x86

    7c2c71dfce9a27650634dc8b1ca03bf0


    Code Sign

    Headers

    Imports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    8c8a576201f68de1a3f26fc723b9f30f


    Headers

    Imports

    Exports

    Sections

  • Breakwaters/Phellodendron/Bygningsvrker/Rocco130/weather-severe-alert-symbolic.svg
  • Falsifies/Plastic.Bar
  • Falsifies/battery-level-40-charging-symbolic.symbolic.png
    .png
  • Falsifies/mk.txt