General

  • Target

    iuserver.exe

  • Size

    6.0MB

  • MD5

    ab2be4f10acb7b12cc34cb6ab9c16f9c

  • SHA1

    82b5e59887561e9c6bbfb08e9b8d6afe06f25976

  • SHA256

    ebad225b14bd5cf576edd3eee5d9a9641a0aabc3c1b22f40be80f0ebd2653129

  • SHA512

    6d7f135648bab0d609c8e9913573c2f6341d522dede3b6a50582a5154fb41f476690cd9232f2ed613f0ca428ccf1de579a3bd7d65dd3c6fe0531a593667ef8e1

  • SSDEEP

    196608:NAumWAOjmFwDRxtYSHdK3Hkdai7bN3m2fqNVL:9vK2pMEB3Qx

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • iuserver.exe
    .exe windows:5 windows x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Code Sign

    Headers

    Imports

    Sections

  • 9-j4��.pyc