General

  • Target

    Crealspoofer.exe

  • Size

    15.8MB

  • MD5

    e520f7912ecb8353fbd32bc3efd950f5

  • SHA1

    3d38633515d7b1cd78915b05aae9ab61cc948f42

  • SHA256

    b2b7b8496cba142081642e58e6533bffaaa9a56418294b0471c7fdc1ad428056

  • SHA512

    780243b827734ca42a5c532c61bc2b4337ce3410c35d73ea724f8499a3463b67083290fdd76755320bacb727752d86f9143f9c528e98b7205d46afb89b07561e

  • SSDEEP

    393216:giIE7Yo9+4uOwKntpUTLfhJsW+eGQRe9jo7BGcG/3JrO0WCWLu:h7r9+RONHUTLJSW+e5Re9M0VWLu

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Crealspoofer.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc