General

  • Target

    rat.exe

  • Size

    15.2MB

  • MD5

    7bb534a596558d649e6ac1d3c3137e08

  • SHA1

    ac96698a9ea9b172af054756548ca6ec35f451a0

  • SHA256

    762c8277c55c791546e54dc0b4a90efd60d18177e272f7a9634be380458cf0d1

  • SHA512

    2addc4a9814860f777aa8f334230aaef6c958248c044336d25ae4c6d04e8a7590f8a350a8707bac0d938ad6138f6a0a620720ef94b99381fe3ac540a4497d22a

  • SSDEEP

    393216:LiIE7YoPQlidQuslSq99oWOv+9rzg+UmpYkA:47rPQsdQuSDorvSrM+UTk

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • rat.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc