General

  • Target

    Petro_Spoofer_UD.exe

  • Size

    16.9MB

  • MD5

    2f5015eeb3e9760fb760d2398dfb0f16

  • SHA1

    2403b710998adc1fdde3ad227c111681b8d72585

  • SHA256

    da133f815df4032869fae7b315019efbffe091b87c154a247bbdaa690aeb177a

  • SHA512

    70e507d77a83d8ea8b3568bcd2c1d620530b1c4ea0605ca7cc6274d345c4f491691449c46d3db829f091e2bd793c04e978cb8e7c72f865340bf2b84a16fd3ee8

  • SSDEEP

    393216:iEkZQND/vcqjmu0DbMXL2Vmd6m0RJVAzDak/ikznaIP6twmFN7t:ihQ9XXKcyVmd4DAvLpey617t

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Petro_Spoofer_UD.exe
    .exe windows:5 windows x64 arch:x64

    Password: Petro2024

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • creal.pyc