General

  • Target

    EAC FORCER.exe

  • Size

    20.0MB

  • MD5

    2981d106a15fa7902d758dac8a9c4f57

  • SHA1

    fb30999cff8dbe20f058ae3f72d4ba20543589b9

  • SHA256

    74353985af6d92b3595d02dbd1a5dcc8848d4d4888c186b688986c3fe5c9f6aa

  • SHA512

    1649637dbc8780f63c6e69f2a1d86d10216a538de2a0b09e16db342fd5c7af6c8437b5988b51ad4facbc1ac017bfe4eb8a2ac12bde062b506e61a255692dc8b7

  • SSDEEP

    98304:JlMcDgiurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIHKU73bcgVowgN:JCiurErvI9pWjgyvoaYrE41JIuIqoxkN

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • EAC FORCER.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • ��ru.pyc