Resubmissions

22/02/2024, 08:13

240222-j4pfqsfb32 10

22/02/2024, 08:09

240222-j19mhafa99 10

General

  • Target

    VoidNET_stresser.rar

  • Size

    7.5MB

  • MD5

    f02641ea08a079a3426d4955bd883a93

  • SHA1

    80c8f8035de7602ab7fe390a0f57185d8d13b137

  • SHA256

    7cc2228371b1cadedecb90655adf5e8501fdb4911494c0fb4f1391b51c34a139

  • SHA512

    79bb887296cbf188fd70c9cd8dff13260e76ad4fe22c5e7e6d2cf6506c5adbade89b59aaa01129022e6c47bf6512ccb1dc95badee8f147f3f5a7aad76129858e

  • SSDEEP

    196608:N8/28QSYjkn0UcozYiLshzj500i3v1dr5:N8xQxQ0doRszM1dt

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • VoidNET_stresser.rar
    .rar
  • VoidNET-main/READme.txt
  • VoidNET-main/VoidNET-main/READme.txt
  • VoidNET-main/VoidNET-main/VoidNET.exe
    .exe windows:5 windows x64 arch:x64

    bae3d3e8262d7ce7e9ee69cc1b630d3a


    Code Sign

    Headers

    Imports

    Sections

  • VoidNET-main/methods/TCP-Flood/tcp.py
  • VoidNET-main/methods/dns/DNS1.py
  • VoidNET-main/methods/dns/DNS2.py