Resubmissions

General

  • Target

    MonkeModManager (2).exe

  • Size

    13.2MB

  • MD5

    a64a50d764de2af1e198bfd517eec2f3

  • SHA1

    913b4cdc597642e4ac33e1a6526cd163f2bc29cb

  • SHA256

    4cbea24a8641dc763864ffe8a2d4ebfa3d7ea5eb7280a25edc0b2e3d4c6cdde3

  • SHA512

    efb92705d50713b06c208a308c0a8eee17c8b05c8622b0158c5974b89484739d2b48d96a860268d86afd5b51f715362542208a12b7e441c6d29d95d5ca3fa1a4

  • SSDEEP

    393216:BiIE7Yo9+4ucW+eGQRJ9jo7BGcGmY/dt1Wom2:u7r9+RcW+e5RJ9Mgpm2

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • MonkeModManager (2).exe
    .exe windows:5 windows x64 arch:x64

    20d446c1cb128febd23deb17efb67cf6


    Headers

    Imports

    Sections

  • Creal.pyc