General

  • Target

    dns.exe

  • Size

    7.8MB

  • MD5

    790dbb65136cb8041bef45727f0f1723

  • SHA1

    8d25aec216b8dc64b657d605580cf8ab867f1004

  • SHA256

    5a99031ba56bafa9c8805b12e405130d5203ffd21e68446a174ee0e975672876

  • SHA512

    11f24ec12c3aac00b868ce0587cc5a7b06008f4ed12a32d12ce00bf8c3c863876600b6303ffd7bc11ca34a519ee4fc71e736db330000665502abcf4357c17816

  • SSDEEP

    196608:csQsvC+bT/9bvLz3S1bA322rl9OqzyjJYPdB:HvpbTlj3S1bO22jOqWwB

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • dns.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Code Sign

    Headers

    Imports

    Sections

  • ��DP���.pyc