General

  • Target

    ValInternalPaid.exe

  • Size

    12.5MB

  • MD5

    92d09ecf8d842c6c5e6a9dbff07d255d

  • SHA1

    fe9fa1f11c02d8c19a2b465ac9e06f3d5431583f

  • SHA256

    c66ed321ea2fa13304fa557bfb2cd3eacedc7dc93f75fe0342141824ad571c30

  • SHA512

    0b47c6302ef26bd9f9bd841a7d71d014b118da3c921a65fce6f199ffa09b671bae369e60ff3758cbbf1911611d3ccf5fedfc23a4065a657c50fdbccaeabc415a

  • SSDEEP

    196608:PHf3KP4sg5L2m76cY2OshoKMuIkhVastRL5Di3tnSEY/y/KLuw42i:PSP4sgl6cY2OshouIkPftRL540vIiPi

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ValInternalPaid.exe
    .exe windows:5 windows x64


    Headers

    Sections

  • ���g!k0.pyc