General

  • Target

    TR4SH.exe

  • Size

    21.2MB

  • MD5

    c069d10ecdfd8a24d4718cc882a6ea3c

  • SHA1

    11fed76430d553b1a91146b17922fd11b32c815f

  • SHA256

    f7a943ecd80633da1e52538b56dadb6e8ab6cbf7a7cd5005b58ce1a844cb02fb

  • SHA512

    6097a62ff864866d2050071cde2566540a78394ef1dae92197250f708cdb21d41e0a6f6203508401b9503d2a0e6911dfc721ec881e910d5fb64e730b728f1b0a

  • SSDEEP

    393216:rzQtsfh5mKmr2pu0tTkQETS8vJQn+9PWkA75umhTdbgDqxMwsQkd:rzQtsfXmKmr2puIYQEW8hQ+ZWl9Jb0wS

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • TR4SH.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • TR4SH.pyc