General

  • Target

    boom3d.exe

  • Size

    17.8MB

  • MD5

    2c606ee91c7e73451739362716c8c49c

  • SHA1

    81e8d845e22766bbb8b5ab19520d456d8d5b6c17

  • SHA256

    001da53f7a370d3d700c0369c61ee51c755f550456bb485912f26852064902b3

  • SHA512

    b6b5f6ef383386102fab9b455cc557d4ae62bab0263b9b7f6d9bc8e9634b277afb595b83730be2b2f5410de073875f947bec99acf7af3e2c5e8b9148259d65b0

  • SSDEEP

    393216:MMiIE7YoFr7M5liAdQuslEQ+l9RoWOv+9fa/5Z7enDnN6:q7rB7M5lndQubQGborvSi/59IDs

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • boom3d.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • Creal.pyc