General

  • Target

    Ip_booter1.exe

  • Size

    7.3MB

  • MD5

    8d92ea090ebdf560b1e8462ca26687be

  • SHA1

    02c1a97e961e513c5eae946549e23d7296321025

  • SHA256

    45e79017bae40c1f595a57b5843f2d66f98992f8120a96906d95b815c7ccde9e

  • SHA512

    b4c6822a096e7213a5f4fe7ee706d829de09282962d56d8624da08af72dbc770601085d776567880c807c52b3ce18e57d017cc43400edf760b9b04191dc2fcbe

  • SSDEEP

    196608:qAvYS6cOshoKMuIkhVastRL5Di3uq1D7m:PYSNOshouIkPftRL54DR

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Ip_booter1.exe
    .exe windows:5 windows x64

    20d446c1cb128febd23deb17efb67cf6


    Headers

    Imports

    Sections

  • loader-o.pyc