General

  • Target

    andreu1k_swoofer.exe

  • Size

    7.4MB

  • MD5

    6a9237abb7af0d0df60b4211427345e9

  • SHA1

    01e35628db861725a0cce63e96bb97b8883c479f

  • SHA256

    814190b09308af90834cd70654b57bb69e4038d5f417d916b6dd98f07c3d83e4

  • SHA512

    33ad68206bf0f305ac19e3361a736a46c14f151e70552efbc73ffab1b51ef32b8b151fd6ca9719c4f7fa47ba2f78b1b6d458d7acc1dbc10000c08e1bbf67cb7f

  • SSDEEP

    196608:raYS6OOshoKMuIkhVastRL5Di3u41D7dJW:mYSJOshouIkPftRL54VRDW

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • andreu1k_swoofer.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Code Sign

    Headers

    Imports

    Sections

  • l!���.pyc