General

  • Target

    Xenox Exploit.exe

  • Size

    7.5MB

  • MD5

    095cfc6cc2bfb81d87d26607d65768d1

  • SHA1

    4af4706852b9afcae603db5e7e9fa63953e3ae62

  • SHA256

    3e9c3921efb283bcbf868d46fba477b990ebb2ee2eb629d258d3e179ea333b36

  • SHA512

    85bcea3dfb806353d2bf0bfd5c08adb3c654fba03464bcf8bb0af29ca8868b792e401224d22851dc5059d0d56a7e1b288e60d522ddc8fdae8caa219478a97a7c

  • SSDEEP

    196608:58QCwVxurErvI9pWjgN3ZdahF0pbH1AY7WtQsNo/03vC1Z:rVxurEUWjqeWx06rYYZ

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • Xenox Exploit.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Code Sign

    Headers

    Imports

    Sections

  • ��F�`�c.pyc