General

  • Target

    lvspoofer.exe

  • Size

    13.2MB

  • MD5

    b011599fd262472273f9d1cce52438bd

  • SHA1

    0a1de65012db18f98de957ed786e3fda4f672a14

  • SHA256

    26d89e1ea2b7a3f46ff269da5d9b93f405a3de68eb87c9df97e67a61b59d20b5

  • SHA512

    a74e7d15f573aab6aba0859ffe45f45380f38380d6cce629cf23f6138466b0c22face14e79f9060a58ef59e007c235c6e1b296afd469a1e68a45405104893cbc

  • SSDEEP

    393216:0EkMD2nwW+eGQRIMTozGxu8C0ibfz6e57Q1bmXiWCUI:0UDawW+e5R5oztZ026e5uFVUI

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • lvspoofer.exe
    .exe windows:5 windows x64 arch:x64

    Password: YK9B2C316D8B114C3B883ACDA0B8875C15

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc