General

  • Target

    ZWLE.exe

  • Size

    8.3MB

  • MD5

    ea7fdd6e602db6cbfa5e91102e1f33f8

  • SHA1

    3ef4458fddd21af88258196f445851e4ec1c6045

  • SHA256

    648d36a30980994f4d98b6f5f40a692dd19d61668b6b4578efea0313f8200d3d

  • SHA512

    f2b132628ac617f99bfad053ec4331dfaca09bdcc84a12acadabb242288072723f51f475034860bd21b78c8819a44f23ff33cec132453f296bf929b8a3a98bd0

  • SSDEEP

    196608:zojEkMTfZyICteEroXxyazYrjCAC+nmDi72bFXIiu:sjEk0fwInEroXEazY3B5nD2Ztu

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ZWLE.exe
    .exe windows:5 windows x64 arch:x64

    Password: freddo

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • creal.pyc