General

  • Target

    vgc bypass FOX V2.exe

  • Size

    11.0MB

  • MD5

    ef98eff293fa90ca7adacfe6cdc2f0d0

  • SHA1

    a369b0eb63692b6b8190eabcfe0c394964331664

  • SHA256

    10835cc279e013fc804ff1c7964c8478d34aa8595baeab870fe52a254e2c2e9e

  • SHA512

    0c1a2bdf73d25026cdd617ff7602dcc6a9274cc2252ce787fd849848087c2ea0803a8fdd1425700410675f60a8adcbca0441e8e8089ceb60f389043480e79340

  • SSDEEP

    196608:1GGQ9Yi0x6YKjXMCHGLLc54i1wN+rPIcu9KYK39sevBaVSEo3PPBZMe+OdNc/ip:IGQ9Yi2qXMCHWUjMcuIhvz9/PBZXia

Score
3/10

Malware Config

Signatures

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • vgc bypass FOX V2.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • cstealer.pyc