General

  • Target

    XENI_LOGGER.exe

  • Size

    13.9MB

  • MD5

    46c750994cbd950b5d52d7f1a96e9eeb

  • SHA1

    9303ce2ac1f3197825732315bdec54ad9cfa698a

  • SHA256

    d11853e3cf26ecf5e4832fe02d554409941704fcd2167f30435ce2a392d1a977

  • SHA512

    3d6d21473ebb761c3a8ec7cfd30ade6d90dfb653bf05e1e8160e06459b49189c522be1f5cb6c5632b969c96f17205bfa4643f5e6f099f50d5d11db521841e748

  • SSDEEP

    393216:du7L/VdQusl7Q+q9RoWOv+9fai6nO6ql:dCL9dQu2QdborvSii6Z

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XENI_LOGGER.exe
    .exe windows:5 windows x64

    1e92fd54d65284238a0e3b74b2715062


    Headers

    Imports

    Sections

  • Creal.pyc