General

  • Target

    setup.exe

  • Size

    12.8MB

  • MD5

    a9034186fae73cf3398c5214cd450509

  • SHA1

    dc34ab8995be10abd983243eedc4ff1d1382a08a

  • SHA256

    7548bfc4fb9fa1e974e9b59ff8f712bd93608329b6126341e93d9e54f6e3311d

  • SHA512

    55f7cccfcef365645caccb96dfa7495bb8a50de8ae7b31dec13a950c38056daa8a16c68d721f9b7d81b1f068564da0676de6e0d6d71adf953b889a4a595e55a7

  • SSDEEP

    393216:du7L/5ArhQfukInEroXkakuIyzlu8pm8ZOLP/EJol72p:dCLxA1QmPErU1gyZ86K

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • setup.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • Creal.pyc