General

  • Target

    SussySwoofer.exe

  • Size

    10.0MB

  • MD5

    38cc06161df8e1ab073197864b81c2aa

  • SHA1

    39985f20d9ed7af0a86a5702e2f57497fc6aaea6

  • SHA256

    bd6804a5eca4f356458502062d4d11a94e32706ebd466fc1cf10e3e082da7fbe

  • SHA512

    e326cfbd920294ad2267efa5033f152611db5c8513ade4bcd695e21a44ff77f6b12ee4c117b81b1a1a01b9e5a3b425d3f3798a5c7bf1d7060c56a2569987221b

  • SSDEEP

    98304:5RMcEjKurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIHKU73bcgVowgO:5rurErvI9pWjgyvoaYrE41JIuIqoxkO

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SussySwoofer.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • .pyc