General
-
Target
dicker.jar
-
Size
639KB
-
MD5
0fa89fdc517bb49bbb26d6b87cd8b604
-
SHA1
1ed2b8c0807732f251db69fe0573507f8a6b5bbf
-
SHA256
fb19934aeba01e2fd743d292e8bc74ab527acd38af401290ce4e10be1d5c2acc
-
SHA512
d9e22cd6671fe71660d011e71b823b628e1ead9f8355e08294a8f6bcac82f8915f9070c689873952c317617df367c5536c8596b976f11ca5f742891b60426e6a
-
SSDEEP
12288:oXXjQP/JN7e9d41bI3OXge/jR7+dpENmf4gm92RDS3wu021kSEBDMD:oXTQXrer4VXXgetiImfFglwup13EBDMD
Score
10/10
Malware Config
Signatures
-
Adwind family
-
Class file contains resources related to AdWind 1 IoCs
resource yara_rule sample family_adwind4
Files
-
dicker.jar.jar