General

  • Target

    sim.py

  • Size

    20KB

  • MD5

    0c472b2e6618aca50cb2dff20cd51562

  • SHA1

    df5a0d16ee26aa97087c9d1cd28e08632bcd6000

  • SHA256

    3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab

  • SHA512

    17ac9ba0eb34fb86bdc2cec890f54b0a802b8535c05bfa8479e69a63c352eba51b9df04eb66b03a431921de7bde368d5a7a2edb6217b7b2871f4cdc1a114a1dc

  • SSDEEP

    384:GRExTcSVqPb61rNykWy/k74Fft1froMzZOguu:NxTcSVqPb6N/7oIeu

Score
10/10

Malware Config

Signatures

  • Braodo family
  • Detects Braodo stealer payload. 1 IoCs

Files

  • sim.py