General

  • Target

    cstealer.exe

  • Size

    10.9MB

  • MD5

    4ac707c95c1cbb1aad316180a125db07

  • SHA1

    9bff4a3d7a853c9b3a1f6b8ed5749b06324cc5f1

  • SHA256

    2ccd08299c7e9502635c701f62935cb3b500224c6063cf44733ad3fd0b190c0c

  • SHA512

    578d9b7b23f67830f545aaecc229e7adc3fad7cb753bfdbe4ce0692fbf44eff794eb1303d4a93a8228665208c6a7a49bf4f7589d541721f00f6a21ae8aea7a67

  • SSDEEP

    196608:sGEkYcxJ+wuLIRBA1HeT39Iigwh1ncKOVVtcUXCg7tqtQ1NjOx74U:hEkYc3Vxq1+TtIiFv0VQUyYg6Cl

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cstealer.exe
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • cstealer.pyc