General

  • Target

    StormLab.exe

  • Size

    17.1MB

  • MD5

    f9b3595c5af5b703f6db357971b255be

  • SHA1

    a6b0ea5f0786e27cf3f5f77989b7c1fed20dfa92

  • SHA256

    fd1f60a5cf3be939a1bd01fd88e0aca5243b1c1336227b092ae0b64d4bacf929

  • SHA512

    7ab31e854438dd937efb3df3b698eee4e62b305ff96788771a053411a0aad35a50c1beefb67ec6541ccac201552b2056adac339440b2b744ab80871f9232a891

  • SSDEEP

    393216:liIE7YoPQJRHi+2ohcyLbdQuslSl99oWOv+9f+TWZXNfpg:K7rPQnHiRyc0bdQu9DorvS2T49p

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • StormLab.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • creal.pyc