Resubmissions

03-02-2024 17:04

240203-vlj9vagdgl 10

03-02-2024 16:59

240203-vhgdsaead8 10

General

  • Target

    imglogger.exe

  • Size

    15.1MB

  • MD5

    f7885f6eb7f24c705673b2bc636aa37f

  • SHA1

    30495fb2a2415a39e6cd42198d1281cbc0f85f1a

  • SHA256

    f6200c2c6a783b91beda7c166c26e6f0755dec715dab2cac71cf102c9242892f

  • SHA512

    bd2c356824f56164b17649fdc5cba30047359dbb4696b1c458e671a90573463fd636d1826d3c7bf78943b75c0ceaf8e320d6f385dde97c055f849c99ecbcf49f

  • SSDEEP

    393216:U3iIE7YopTRk3meCcGfdYYM0G9bYXN9kIEuBUrfzA3/:T7rRRaY5FYYFWcXLh+zzAP

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • imglogger.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • creal.pyc