General

  • Target

    C4lexFckingC4cked.exe

  • Size

    10.2MB

  • MD5

    298004294ffdb857920787bb81effda9

  • SHA1

    7239c9a132daf3a2ed11345772bb43c5fc9619d9

  • SHA256

    367e6943901a7a573bde560b7a97216af66ef985bd1b7c37a525c9c6fd3b8436

  • SHA512

    59162ec2f6ed1c523514fcc9da07fffd6394d3c6c7689bf36145fd3bf827fbc6dfa97a8b104dd394a549ddff5f2dd8eafc96f7532764e6a847070247d94f271a

  • SSDEEP

    196608:E0EiIE7SRpoIEDn61W903eV4QR7MToEuGxgh858F0ibfU36e7mgABObk91tllWT:IiIE7YoI2nwW+eGQR7MTozGxu8C0ibfK

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • C4lexFckingC4cked.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc