General

  • Target

    votware.zip

  • Size

    14.2MB

  • MD5

    5666607b91fa14f6fbdd5067d405240d

  • SHA1

    0fe5e7a9e22138b154f0e4f5a185d4590b56cf18

  • SHA256

    e7f583bb9f3a6bb45a0f1b59cf2c3f2060553e939adeeebfb996c7912163c8ff

  • SHA512

    25c763da415e07f9e96268ca30ef48e3552904f5c7cf06ade457da2dcd91fae70bb4ecfa4a35ae0daaa16aae38f5fd88651b1d658ad16a7e217e23ed60266349

  • SSDEEP

    393216:BSakY4ygiBleOodeqgFmGAURbWkTK/agJY7:UHY43iBlT0edF5Rb12tJa

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • votware.zip
    .zip

    Password: sloki

  • votware/READ.txt
  • votware/votware setup.exe
    .exe windows:5 windows x64 arch:x64

    Password: sloki

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc