General

  • Target

    ROBLOX.22003.BOOTSTRAPPER.exe

  • Size

    6.0MB

  • MD5

    7a7b01ac954f9ddd0d621f862d1b652b

  • SHA1

    a3f22c0cdcb88506cfb791ab62946f134e048796

  • SHA256

    21828292a97fd1edd32d901eb26c65682e78651d4339f520b851a2205ca3b9c0

  • SHA512

    e0a25ccf80027b1d28c2b7427f3406191db4bf2a935ca2c7e5c65cc80c15b47f7e3da12ff406a6526ff9502ab9401b0adcd59d7e50b3f92757ec76f89e6b5bae

  • SSDEEP

    98304:ocEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGK4R2CTjBHOC47uo:orFFeN/FJMIDJf/gsAGK4R2CTjkCiuo

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • ROBLOX.22003.BOOTSTRAPPER.exe
    .exe windows x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Code Sign

    Headers

    Imports

    Sections

  • �j�*�C.pyc