General

  • Target

    RatMaker.exe

  • Size

    13.0MB

  • MD5

    067389844c14ca455833a3336712f11e

  • SHA1

    f4d034fe28f01d2bf4466000ffa74a31e0bb0b9f

  • SHA256

    d7d93ae963705be2629de83619b7e27a11321dcbcc2e12b0973a7edc4568eaf4

  • SHA512

    8c4d17a62874585545da2caa2140d4a41adc3a73e62ae0456725c3621146ccdceebd26270bb24b82f9efc81321fb62cb0b6d7b934eaa58ce5aee64c016aab722

  • SSDEEP

    196608:o307ZzZeNTfm/pf+xk4dCX/O2DRGtrbWOjgWyr:xzKy/pWu4MNDRGtrbvMWyr

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RatMaker.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • ����$T�.pyc