General

  • Target

    Luneria.exe

  • Size

    14.4MB

  • MD5

    2f8bcb46f3bb005735ac43145c4ea5d4

  • SHA1

    4d1a2e3d7f534ea0f55f575b15a17b1202fc0842

  • SHA256

    02bcdd66f3f5ad00ba19e2866a29b694340793a80506c79c05e0bbb12a113540

  • SHA512

    7013cc601c439edb130992245ea7f907268d8afad8165ac0e996590451ed6b4156eef598121485b06e3916fb0801c2ccd3e28861d699f05e7329e622d07b0a1e

  • SSDEEP

    393216:JiIE7YoPQ6dQuslSq99oWOv+9fgxEmmUa1EaW:W7rPQ6dQuSDorvSYxNmNE

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Luneria.exe
    .exe windows:5 windows x64 arch:x64

    20d446c1cb128febd23deb17efb67cf6


    Headers

    Imports

    Sections

  • Creal.pyc