Resubmissions

05/05/2024, 12:32

240505-pq4w6add25 10

05/05/2024, 12:32

240505-pqpr8sdc97 10

General

  • Target

    Lord Exploit.exe

  • Size

    6.0MB

  • MD5

    1fca34b0e3999a2805b5680e441dfea8

  • SHA1

    5124ff52ce33bf81575eb31ee1bb18cd6a0587bb

  • SHA256

    e4a364a4d809bdacfb943116db6ea4b123cbc579f9cdcabc75a3aba2985ffdf4

  • SHA512

    25a5ad21a3ab9adb68350aaca75ecd28ee177da0fda6a96fa1f038f20599e63b9c21573258e46dfb65b18905d6dbd07481962534e192e84a5a176f8623edbb02

  • SSDEEP

    98304:wr8ZEtdFBGkamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R2OuAKuXwAX:wr84FEFeN/FJMIDJf0gsAGK4RFuAKuAI

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • Lord Exploit.exe
    .exe windows:5 windows x64 arch:x64

    f4f2e2b03fe5666a721620fcea3aea9b


    Code Sign

    Headers

    Imports

    Sections

  • ��r.pyc