General

  • Target

    ROexec.exe

  • Size

    16.1MB

  • MD5

    bb87d0428bcf45096361905394d54ea6

  • SHA1

    3f6af9965392527f1114ceefa310a358bdd4e891

  • SHA256

    4ee96641b42756834975a2cd7940ff3d36132289e9f5d37867d6d1fe2ef6cef1

  • SHA512

    4790c538a68b8a4d93e869e624d8aed3017d0e58ee19e760df4e8dd845d119821c7c9f4663e05ebd270cd669ad297c79c8996112564faf6230b9470bcf054778

  • SSDEEP

    393216:VrHDJoShonfH28IcSvucRuHKL+9qz8LD7fEUbiI6NQcH:djJhaH2TvL+9q4v7fEbI6zH

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • ROexec.exe
    .exe windows:5 windows x64 arch:x64

    bae3d3e8262d7ce7e9ee69cc1b630d3a


    Code Sign

    Headers

    Imports

    Sections

  • P?G4�`�.pyc