General

  • Target

    CelexV1.zip

  • Size

    20.2MB

  • MD5

    04797f35bb835a3b7a128fd1a9fb06b7

  • SHA1

    d12067e823ee8a8e86a798d05887cac22f49fbb7

  • SHA256

    dd480e8cfd2c686f6d59aea4aadb4ef5e78876caf456413c615d31099937ec5d

  • SHA512

    f084d0aa6de9c01386b5af93f201d95bd8c1cb243eb7d2a43c90322eacc9ae8afc86e6818ca1b1face4c440852b2137071d2bb7211240d62327d491314c58df1

  • SSDEEP

    393216:s+zg9o0dTQgzb/5ScG9CbHUKPGKwewmHYX2ROpxSdeX:s+go0dT7DZaIHz+yg2yx8y

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • CelexV1.zip
    .zip
  • Celex/Main/Celex.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • creal.pyc