General

  • Target

    LoserLol.exe

  • Size

    16.8MB

  • MD5

    98847e2ecce85bc90534bcadd322e68e

  • SHA1

    86337da26d9bcd30bd63cad496148667163af459

  • SHA256

    cb8d1eb1f130f80de079c6dd8b078434d32e64334781beb589dda4318c73ed7d

  • SHA512

    405865135dd2a5c7f534a013c743dd2a01c0c44bfcce5de00ca79e1505a49a260774c12ecf8c5cda2372b237120a7ec203aca8d3eba7aa43d918575d3c4c4e3a

  • SSDEEP

    393216:jQbr7M5liAdQuslSl9RoWOv+9fgQU/Ky39J7f:jQn7M5lndQu9borvSY9/T37

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • LoserLol.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • Creal.pyc