General

  • Target

    vheck.zip

  • Size

    17.7MB

  • MD5

    0a7c720107909c60547c6decd915bd91

  • SHA1

    c362144d815eef8628dc330febbccfa51199c51f

  • SHA256

    31723382c02a8258622764d937f24b42ee25f0894cde46c99b96a1558f426e96

  • SHA512

    39cadbbfdf5796003cb61f53326ddfc6e23ef11dd39f8dee053764fb13a34a8b9f9511093a82ff73c66c63f5ce242b80d267dbb111f21a7d04e2f1e7b8fa8676

  • SSDEEP

    393216:AW80aleeQUjXax8UPG1OjI5Ah3yysi37hNvf9WUmaXcwYa/Q2bcZVha:IlhDR1CI5AN3z3NFYUfXYa/Q2oVha

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • vheck.zip
    .zip
  • vheck/applecleaner.exe
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • vheck/applecperm.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc