General

  • Target

    zeromenuv2.exe

  • Size

    42KB

  • MD5

    4eaadfa14bff7bd090434d2fcf1abfcb

  • SHA1

    1f53ad5a976b07de4a9dd13e3b29b1dec4d07d6e

  • SHA256

    ce9e29db91b72e67f86cd882eaf5d83414b2a0e8ceeb8743217ae948a6049cff

  • SHA512

    9bdd42f4df6d5f53239216b62e2f893fdcbe9313937203fb598025a30426fafac128bd16708017c544525c769e6f20c74b775980b2bee1af6fe95550f77eabd0

  • SSDEEP

    768:Q1DAWROnXeihOCSlqLCxzAj6VppDPi7WR:Q1kWROnhhFSQLhmVpoWR

Score
10/10

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family

Files

  • zeromenuv2.exe