General

  • Target

    run.exe

  • Size

    13.2MB

  • MD5

    9b562b261c39eaada13261bf18b289fe

  • SHA1

    24441e3dbf2e3c020c13f13e28d8a5b91d8cc884

  • SHA256

    9f68a350d93d11106d80961b5c78d3e80397486ea27ba878c45ab09d04cb98a1

  • SHA512

    967413c012bba442d54d4ffce9b666213c996cf46e62d18c63c511060aef1a75fee538571f2e2a6aa67994b173b4483e0463d5ba9c304c72dc818719ce89470b

  • SSDEEP

    393216:8iIE7Yo9+4uaW+eGQRJ9jo7BGcGRY/dt1WomY:17r9+RaW+e5RJ9MtpmY

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • run.exe
    .exe windows:5 windows x64

    20d446c1cb128febd23deb17efb67cf6


    Headers

    Imports

    Sections

  • Creal.pyc