General

  • Target

    Executor.exe

  • Size

    13.1MB

  • MD5

    69377ed2d8fd217dc312999ff7ac7b6c

  • SHA1

    219ce0ed3d23394f7d2ce92453be8173038f2938

  • SHA256

    326985d1bc5a680d30b9140ff3a12b7603a8397b9e873dfd83fd9e96e4e17f5a

  • SHA512

    0a9213edcbf8f36f2a03b810966a849f187034fdec717c96fe8e1c0d67de8cdb6fe884f23fd2bb989c1e326800805f5a962c62bd5fa97c439560f990077fe400

  • SSDEEP

    393216:eiIE7Yo9+4uOw6wW+eGQRJ9jo7BGcG6aJKt/WorLP:f7r9+RONwW+e5RJ9MrprLP

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Executor.exe
    .exe windows:5 windows x64

    20d446c1cb128febd23deb17efb67cf6


    Headers

    Imports

    Sections

  • Creal.pyc