Behavioral task
behavioral1
Sample
gang nuker.py
Resource
win10-20231215-en
windows10-1703-x64
21 signatures
150 seconds
General
-
Target
gang_nuker.rar
-
Size
4.9MB
-
MD5
0d7957770cd15c725105e09e1ef522d3
-
SHA1
6a4c71f13a3c9f845f32fb0aca07f2f85df40710
-
SHA256
18d50f05499e3311fa811582868c234924fef1e271586bdaac4403856f125ab5
-
SHA512
2265ebb6de6b6348ddd8ac2e44bce4c4514a95dfee1494f19497c8fa8cd623811205750371a9e7aa003c00224f80ce70ac9c9e0eed0b312a110773276373ebed
-
SSDEEP
98304:p2gd+32VFWXpu/cbpuTeyTBXFWs0DLOPXi4c0nHylzHAq7+Ans3rM:pdIaMu8dyTBXa+ncdzHAq7+z7M
Score
10/10
Malware Config
Signatures
-
An infostealer written in Python and packaged with PyInstaller. 1 IoCs
resource yara_rule static1/unpack001/gang nuker.py crealstealer -
Crealstealer family
Files
-
gang_nuker.rar.rar
-
gang nuker.py