General

  • Target

    cve-2020-1472.exe

  • Size

    13.5MB

  • MD5

    32e43257e13935ae8ba5ebd84d6cfb75

  • SHA1

    d9ab96f6edb1ca8992ddca2774087e46e7ef8a0e

  • SHA256

    81d596a70acb317bac73aace80548d0cfd59625c783b0ccd0fd2186f464a6ca4

  • SHA512

    0a6c7b84a00eb93e4f3fe40788cfd0fb7eeb16bf55287d1f58c0cb1d5aba0c973ccc823484f5700635ff94611a278fe89af3c48a35cbedf28dbf3b9ea48301b0

  • SSDEEP

    196608:e0YlTCi9bGXJf5+ICteEroXxw0sKYu/PaQDczlxZV3Gu5D4S26QEOOCS3gJTDuk/:qTCi9XInEroXgQg14S2mbwHeBBMtLw

Score
3/10

Malware Config

Signatures

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cve-2020-1472.exe
    .exe windows:5 windows x64 arch:x64

    ba5546933531fafa869b1f86a4e2a959


    Headers

    Imports

    Sections

  • cve-2020-1472-exploit.pyc