General

  • Target

    rohub_test.py

  • Size

    118KB

  • MD5

    7419ec8637f6f280449f2eee0c801411

  • SHA1

    71cfc2002b58b3bfcb592594f28026546c922e6b

  • SHA256

    43eceb151fd7894df6c9dda48556a23e4d0e386b6b27c415b641b5d8851c989d

  • SHA512

    c197d46db507bd2df74b06beba28210172724e070b8762d15b05d510c003b7f38ae131b836c377c6385c1d080075e1e3b7d8572f05e7128091f73074e71c20f8

  • SSDEEP

    1536:Q1kWRKnhhFSQLhmVpoWU0QuixAH7EQ4sMgmG1euOK6VW:Q1klhhFhhgzQuUAbEWMgmwgs

Score
10/10

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family

Files

  • rohub_test.py