General

  • Target

    DiamondExternal.exe

  • Size

    14.5MB

  • MD5

    37c7fad6f12ac338d5e5186b17db9156

  • SHA1

    5ab8373f76001ac8a8afefcb4121886a6b296406

  • SHA256

    b4fe190c272a92fb7b80e638bad1f08ba6f62b08854845aef654ef3907fb6c6c

  • SHA512

    fecbd986d473ffce24fa10753c95d1c46fec82915f2574c1c3ec169dd474110fd86b6f0b2618cde84cb280960cf3898ba53ca2df999cf391079d0eec5890f665

  • SSDEEP

    196608:qmEkv0sKYu/PaQ+DuXJpjbiDfyGgMwBdnpkYRMC8NJqyKGcl/Y/a5U966:vEkZQTiDfDgMc6Zrqz/uakT

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • DiamondExternal.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc