General

  • Target

    Bootloader.exe

  • Size

    8.5MB

  • MD5

    04bf7634630f3527ab5351ab84009ae5

  • SHA1

    a5c9bacef688213ecfcf3e528eca269e29c68c16

  • SHA256

    9145a2820d02861ab749bdb94dcbe432e3fdd414ec7d409b4e4317f744f08761

  • SHA512

    b204be588adb57d7776bbc27f6a472d8bf827076caa8052fd994a394bc2419846bc0efed0198079bb5aa55dbc5d67150198cc4f652a3e362f84036ac9fd26262

  • SSDEEP

    196608:1r0JT+sxfWVhiurErvI9pWjgU1DEzx7sKL/s1tUgWUHAkjUWlRH2WS:gXxfWVsurEUWjhEhn01trWUd92WS

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Bootloader.exe
    .exe windows:4 windows x86 arch:x86

    8c16c795b57934183422be5f6df7d891


    Headers

    Imports

    Sections

  • v��q&�.pyc