General

  • Target

    mjrwfr.exe

  • Size

    13.0MB

  • MD5

    0b751e49420cacccf0360e7f63bccde0

  • SHA1

    3830ea11d4e4ff91faee897a0f97385778d08b4c

  • SHA256

    c529d0ef573d16e548d476557372b6f5137fb4c2c1bbadbb74f400e3f3ff4aa6

  • SHA512

    49b9be1c94ec5ba9cdb196c2be8d548cb2212c3d40791501471e0d3756b721c759d64c0b5d1bccfb51fab8477c8865aadb35b6169527f1bb3df6464c22d644ac

  • SSDEEP

    196608:EeY2OshoKMuIkhVastRL5Di3tnSEMfSPJq:9Y2OshouIkPftRL540joq

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • mjrwfr.exe
    .exe windows:5 windows x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • �eȀY�c.pyc