General

  • Target

    RedEngine.exe

  • Size

    13.3MB

  • MD5

    d4fcfca5ccb9392799fa8d81567307a1

  • SHA1

    fa5345977385325ae6f58879229504f47fcc0c7b

  • SHA256

    714d17f082203236c5c1ab7e65bec424102b67507f29b28623eaf7f63d5a014e

  • SHA512

    4a9922a4311de9dc79764c9e1bbbc847050d6b72015788d5645802567b1dc168981e1d202c6d66f370c7ae105b15020c5d285424a9cfe359dccf01b7ce6b9e9e

  • SSDEEP

    393216:r8iIE7Yo9+4usnwW+eGQRJ9jo7BGcGt1AzZFNoqN4WTr:x7r9+RowW+e5RJ9MamNWy

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RedEngine.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc