General

  • Target

    ActSet.exe

  • Size

    10.0MB

  • MD5

    bb228dff85323a06f460a89a398fcdee

  • SHA1

    054291bd2d41e883f38b9323c6b3b7506f8f4d8d

  • SHA256

    505481d658367cfc81bf02fd8f8dbb45c6a48ba14a4b5388e1b14dcc7f7b4d77

  • SHA512

    a17303b0adc164152ee93be6686c7fc80724b686a9e4d19d7ca66a79b0af41ca7fe15d9ce5b51f3285aafdd6ac59f04b0e6e5b1b6c0c48b19f4b6d85432c5d64

  • SSDEEP

    49152:CeNzxKvAI/KnCAjFN2DOjwJHJdVLD4+04p+cn0Jmc9gqSsOp4MQ+FnFrMR5:DCA34pfBGgqSsOV

Score
10/10

Malware Config

Signatures

  • Detects Fredy Stealer Payload 1 IoCs

    Fredy Stealer is an infostealer written in C++.

  • Fredy family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ActSet.exe
    .exe windows:6 windows x86 arch:x86

    11ee4bff148d771cfd149b0c3e7f7a06


    Headers

    Imports

    Sections