General

  • Target

    Nitro Generator.exe

  • Size

    17.1MB

  • MD5

    bb64387766b55fe98c73767ad9076686

  • SHA1

    e053872b961382c95e5c58d035b50b52d34803b1

  • SHA256

    a5cd667a686d3140aef60b4d11679491751a24adace845c04a65f9db84483488

  • SHA512

    e77cdf900a430616aa99eea4fa56737c7dade78381de68e17471e14b366fb8f1faee867ef1ebc22e753b70fa166e592e9281e8e47c5be63184ae61db8b90707c

  • SSDEEP

    393216:3u7L/sQbo3pUTLfhJjdQuslSl99oWOv+9fPjMb6Y5/n:3CL0QbaUTLJRdQu9DorvSHjy6Yp

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Nitro Generator.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc