General

  • Target

    dxrk.exe

  • Size

    6.9MB

  • MD5

    0438f9feb601e4d2a3fb2687b160b90a

  • SHA1

    f37a4db22d9b58844fc0fc1753e0201861267f21

  • SHA256

    45aba51b06cd23a18801950943cf12bd32c9ee8f3d8cd804a9802513f879a473

  • SHA512

    e406b95a411579685fdf336aeb14ed3bfd85328f76d3d34924fca8a76e69aa3e637c2d5574a1206b349cffda3058ee350ee4abbd3ef5c09d7f7e488c5535c0fd

  • SSDEEP

    98304:vrUcDjWM8JEE1rytamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRGYKJJcGhEY:vrUc0peNTfm/pf+xk4dWRGtrbWOjgWyK

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • dxrk.exe
    .exe windows:5 windows x64 arch:x64

    f4f2e2b03fe5666a721620fcea3aea9b


    Code Sign

    Headers

    Imports

    Sections

  • �a9�o�.pyc