General

  • Target

    Server Rapist.exe

  • Size

    13.3MB

  • MD5

    2ca414ba6c6020d9dfca377c906f92bb

  • SHA1

    b9cbdd9573f610bb6ecc66701b53220dc1525a3f

  • SHA256

    1d968f4f698b2d6b6ca2646ba3f419a477584e3686e1b7de73dff6cb89d4528c

  • SHA512

    a5b06d4e27f789b9cf6aadc268428a7cd0ef019efe63f0e264e3cfedb469aa2d31a7e35f7561f845f7b87aa7e846be94a70323e83d8957b58e353c9cb552526c

  • SSDEEP

    393216:s831+TtIiFGvvB5IjWqwau5qW80hoA/bmzvkNm0C:t31QtIZX3ILe5qW80h9kkNmT

Score
3/10

Malware Config

Signatures

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server Rapist.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • pull_l4d2_server_ip.pyc