General

  • Target

    RoExploit.zip

  • Size

    9.8MB

  • MD5

    541233964095fa8853c6313083226a9b

  • SHA1

    80a09216f65f38bbbe1e2a0c80792e0956aa2033

  • SHA256

    416eaf69f898290bb635df116ddeac71beeacd78b4eb5ded213f9707802dd5c5

  • SHA512

    70c4c2213d832fae3abff77e69cc80bda78df3a9c714cf57c6f200ac0bec1aa748fd8b70c28a2ad1e4513e74de92ec62d2af9120c2bb0f3ac373e6384564eeca

  • SSDEEP

    196608:4dkNNm9HQJTaOJxlFPbL8W+snbW2QJE21KEZNdB6fdhAcslQWae:4yNk4zJlzL8rsbW22ESKEhB6fDAcsuWb

Score
3/10

Malware Config

Signatures

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RoExploit.zip
    .zip
  • RoExploit/READme.txt
  • RoExploit/cstealer.exe
    .exe windows:5 windows x64 arch:x64

    2ac23c52e7647c5bbea38e98bb68c652


    Headers

    Imports

    Sections

  • cstealer.pyc