Resubmissions

10-03-2024 18:52

240310-xjempaab45 10

General

  • Target

    Nuke.exe

  • Size

    13.4MB

  • MD5

    4e5e0431625d13451f78d390a982b437

  • SHA1

    48a38cd998f5f40f079cafada3ba209936841ba5

  • SHA256

    c9ab278f3f277b37f21385531d827d917c26b14d9f2e94bbf955aa7823d3b1b1

  • SHA512

    085b7d3fc09e35c3f55098e9adf94d8d15dcd958a14e0bdb1e05838eb832c1d292fcc0cece53d936bc0600a6f83e74a53a2b9c878207fd0d66a4e3e384b0951c

  • SSDEEP

    393216:tlRkNEkZgf8iq1+TtIiFGvvB5IjWqn6eCz1aypX8Wjs+da:NyRbiq1QtIZX3ILn6enyCes+da

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Nuke.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • creal.pyc