General

  • Target

    unparkcpu.exe

  • Size

    10.2MB

  • MD5

    7e1f8a4eee4c5fceaff6bc615c9e3e67

  • SHA1

    a63b57b857a984e9764aea434ac1cfc52facfc5a

  • SHA256

    4baae4b07fae36e2dee0ccf6e817cce7dc248973a367ccf27a5b4f43f83d844d

  • SHA512

    b34019724eb596444c000a577ce1d444b4ce7ea4c6781349429b3d66fd390d1176d2d27b63e5e7ded529816eb57fcdc84f2ee0d8738afc79794599b9cc1ba111

  • SSDEEP

    196608:dhWg0+EkfcdqBA1HeT39IigwdeE9TFa0Z8DOjCdylLhYMfIGQfkdoXKh:8+Ekfc4q1+TtIiFUY9Z8D8CcldlQNbX4

Score
3/10

Malware Config

Signatures

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • unparkcpu.exe
    .exe windows:5 windows x64 arch:x64

    Password: infected

    f4f2e2b03fe5666a721620fcea3aea9b


    Headers

    Imports

    Sections

  • cstealer.pyc