General

  • Target

    red-engine-main.zip

  • Size

    6.9MB

  • MD5

    01ca228491d04a7536bd4b2a175d2fc7

  • SHA1

    18d76f486d75d59dfe564d8dcaddeab297797fa7

  • SHA256

    10c497f2d32426b29bb0e9dc092f01d277163084565c71caab1ef0165bafef8a

  • SHA512

    2edfb37c33f6bc8c1f24ec92d9da7857d7db9812eeb2f65c553d9c9b840cae0da59a16efe894e3e24cb478e1176f7ef6ef9db5083b6cea4f4b4ebccb82819e76

  • SSDEEP

    196608:PwTegiFXTtGRblFSr5W2mfXascwrp8Yd8ay:oiFXRQvSr5PmfXascwN8Yd6

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • red-engine-main.zip
    .zip

    Password: hujkj

  • red-engine-main/key.txt
  • red-engine-main/redEngine Cracked.exe
    .exe windows:5 windows x64 arch:x64

    Password: hujkj

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • loader-o.pyc