General

  • Target

    RC7.exe

  • Size

    13.2MB

  • MD5

    befb565fe5a30f70e2dc55b065edd766

  • SHA1

    68116934bf8f03bfd8c75f1f9640d560cd110994

  • SHA256

    6b8fd61dd368291bc6f14ced7fd0530d7cb8f3b769ee1964798515a0b1d43864

  • SHA512

    ba34e9f1b6b77d1544182c90f8baef2432a9540696e55fb4d96cae193f9b69b1c35920264b85b72831c869df9e2cb5e5e0d4a4f9ee2011ff8719bc8fc9be89c7

  • SSDEEP

    393216:3XGD2nwW+eGQRIMTozGxu8C0ibfz6e57g1bmXiWCUI:32DawW+e5R5oztZ026e5WFVUI

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RC7.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc