General

  • Target

    SeroXen PAID.exe

  • Size

    23.0MB

  • MD5

    80375ea248f77cac74f4a7cd0fd495b2

  • SHA1

    1d84b25ae76d851e77d0258216d9b9f07064246d

  • SHA256

    41f4d1e8e488c7e20bc0ecd8084e3fbdeab8c48439c79e510ae63da3564afec3

  • SHA512

    53c32b9361dbd7fb7fbe4ae36f6c99acd65978d0149dbf528b44fab140d7f7144305d204767c5f81dc587354a9fec96f0b56e0f2f3778f4ddb49fc05aec6254e

  • SSDEEP

    98304:A0EtdFBgwzQamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RAPMPd31MwTg:AjF3eN/FJMIDJf0gsAGK4RAkPUwTg

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SeroXen PAID.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • � ,����.pyc