General

  • Target

    setup.exe

  • Size

    41.6MB

  • MD5

    367508dc504f59a05096555a60d9359e

  • SHA1

    044a9b8abf7abd7484e18922ac55d3294dc6cc22

  • SHA256

    ee41b124b3a612f8c9a0a2438c53911a96eda7a95e080229af9d8fb4f8190413

  • SHA512

    c027877e94da69d0b951fb685d7b1797d28290c8240b746ae26be4880d82a8f2baa0fa0c39ac87abd7ce5ddf90daff449cf62d79d65259d4019792985ad7b057

  • SSDEEP

    393216:L/jkxiIE7YoPQtsTTp7Lk3meBcGfd0vYM2krlFk1mX1eq44:rjke7rPQts/RLaT5F0vYvXFg

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    1

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Quasar family
  • Quasar payload 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • setup.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Creal.pyc