General

  • Target

    andreu1k_swoofer.exe

  • Size

    7.4MB

  • MD5

    a33e8d94bd8079e9da76414569cc3fcf

  • SHA1

    aca7d79c09487b37658f88ba0f90af49d296c203

  • SHA256

    aa7ab93c7fc9bf66a42066b457a90793971808a0d09ecddbaf5a747ccfdb5aa3

  • SHA512

    16d41171806a11f908817caf59bf3bf3f224a509c893e020873f7dd174dcc1dd2ce1853aa0a68036758b29eeeb7c1e4c746447c50ccef868b6e6623ed9645833

  • SSDEEP

    196608:aXYS6gOshoKMuIkhVastRL5Di3u41D7dJR:SYSjOshouIkPftRL54VRDR

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • andreu1k_swoofer.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Code Sign

    Headers

    Imports

    Sections

  • ���s�ݹ.pyc