General

  • Target

    DVC PAID.exe

  • Size

    14.5MB

  • MD5

    053fb6a8b10cc4c8d8958dd957310777

  • SHA1

    b0254dea000bbb8407ae6b35b3652f73262244d5

  • SHA256

    9312cef89105cb6c6a8dbdfbecea0f40626cca556899cc745e581fdf404cba9e

  • SHA512

    3eec67966ee680a0a7146e37429739a7399080131ba352073a9dbe49ae28687c46fe02ea99f0ee3e8633cc0660b7d2b1c48ec578da5996cc15531f6306ee0b69

  • SSDEEP

    393216:jViIE7YoPQfdQuslSq99oWOv+9fgwXAnYR:j67rPQfdQuSDorvSYwwY

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • DVC PAID.exe
    .exe windows:5 windows x64

    20d446c1cb128febd23deb17efb67cf6


    Headers

    Imports

    Sections

  • Creal.pyc