General

  • Target

    Lethal.exe

  • Size

    10.2MB

  • MD5

    9c463ff25b235544c8f66f1bdceb3657

  • SHA1

    5302794610a45a59175cf2589373085c77e45974

  • SHA256

    ce396d7bfffc21f2f3054214d8ea9ccd3aa9ed7ed8b26644e7faa33c6bc82afa

  • SHA512

    598e0675308c5de9bdd9b5947f4da9b79d916bae648b5b1ee9fc90b3ff1fd71023f0c2d835913d987630f02242b37f816f1603490f2b5b05452ed93743aaf05e

  • SSDEEP

    196608:yyXiIE7SRpoIEDn61W903eV4QR7MToEuGxgh858F0ibfU36e7mgABObk91tllWT:/iIE7YoI2nwW+eGQR7MTozGxu8C0ibfK

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Lethal.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc