General

  • Target

    HyperWare.exe

  • Size

    16.9MB

  • MD5

    f72d152f5e62a72cd9406a76eae2cc94

  • SHA1

    8b1cb6bb683d010dcef3dce07e248468b92cecf8

  • SHA256

    d8e989aa0fdef207f7d5dd6915f725edb40d423cae221c59aa0691dd8e86c351

  • SHA512

    ac48ff8bcd45bd35bc178a9c9d34f88fcb33925f04db98439188a7641d2246ac069b1f4af2762bdcc4b489ca5dc0913e616e9c9f7d64956e74d263d1fe831652

  • SSDEEP

    393216:f3iIE7Yoa+4uWntpUTLfhJsW+eGQRe9jo7BGzgG43/q66WCQ:fM7ra+R6HUTLJSW+e5Re9M4tVQ

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • HyperWare.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • creal.pyc