MalwareBazaar Database

This page shows some basic information the YARA rule Win_FakeInstaller_PythonShellcodeLoader_Crepectl_2026 including corresponding malware samples.

Database Entry


YARA Rule:Win_FakeInstaller_PythonShellcodeLoader_Crepectl_2026
Author:SixHands
Description:Detects the analyzed fake installer sample using .key config, XOR key, and Python/fiber shellcode loader traits
Firstseen:2026-04-23 03:29:16 UTC
Lastseen:2026-04-29 18:57:55 UTC
Sightings:15

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter