General

  • Target

    stealer.exe

  • Size

    16.0MB

  • MD5

    81da6189145c24816d35bf038845e753

  • SHA1

    741dc8f77ff22f23450ab362054889828dfdbf3a

  • SHA256

    c0308e2ea71ff40ce878556504ed644435ec61502bd5d01941ed632ccec029f9

  • SHA512

    1dce39462761bff379360e3a80938bba27c7c429481fa476f54623f836f284f03dd692a4f846116ec27f4aaa5776698fb757affbd3d28e0befee3f6be1f8bf11

  • SSDEEP

    393216:bEkZgf8iSNPG7NmiZoW1+TtIiFGuvB5IjWqn6eCz1kypRXiWCoaa:bRbioKEAl1QtIZS3ILn6ehyaVoaa

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • stealer.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • creal.pyc