Behavioral task
behavioral1
Sample
zeromenuv2.exe
Resource
win7-20230831-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
zeromenuv2.exe
Resource
win10v2004-20230915-en
0 signatures
150 seconds
General
-
Target
zeromenuv2.exe
-
Size
42KB
-
MD5
4eaadfa14bff7bd090434d2fcf1abfcb
-
SHA1
1f53ad5a976b07de4a9dd13e3b29b1dec4d07d6e
-
SHA256
ce9e29db91b72e67f86cd882eaf5d83414b2a0e8ceeb8743217ae948a6049cff
-
SHA512
9bdd42f4df6d5f53239216b62e2f893fdcbe9313937203fb598025a30426fafac128bd16708017c544525c769e6f20c74b775980b2bee1af6fe95550f77eabd0
-
SSDEEP
768:Q1DAWROnXeihOCSlqLCxzAj6VppDPi7WR:Q1kWROnhhFSQLhmVpoWR
Score
10/10
Malware Config
Signatures
-
An infostealer written in Python and packaged with PyInstaller. 1 IoCs
resource yara_rule sample crealstealer -
Crealstealer family
Files
-
zeromenuv2.exe