General

  • Target

    yuki_loader.exe

  • Size

    7.6MB

  • MD5

    788631e9ea78626e46d4f2ded0090567

  • SHA1

    21ce32aa531fb7bd6482e504aa82da8e4ac1153d

  • SHA256

    8570e68d65483e9f1a4944893c598c8dbefa5e2dbf77fbd6a61f9f714cb3ef4e

  • SHA512

    53445014ad9b11196961eea1136f1530ca15713c145cc099cc5c865a6925e613ad562844e617e9fdf177b54cf7720648ec7c07de819733ff33f169be5d797b89

  • SSDEEP

    196608:ZTV16yqwB6ylnlPzf+JiJCsmuMvfnFm1o2AZudNZF:0yjBRlnlPSa7mdvfnnuJF

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • yuki_loader.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Code Sign

    Headers

    Imports

    Sections

  • ���}��e.pyc