General

  • Target

    ZulyBoostrapper.exe

  • Size

    13.0MB

  • MD5

    dd9474b08ed5d9a647449aeedd074dcc

  • SHA1

    1a53d119ea0f781b6bc6290e716428deb7f40892

  • SHA256

    77c9671adf1b73b1b315d614e3d44a46804533f6383f576e20b132be32542cf6

  • SHA512

    e35fcdfc1c1a32592c9352a75f029403d6bc873fc0405d21b69b82d5bb829cabe46815384865c8099a42c76c48ca53845bf6b64411d3f3810e5a3ad269254714

  • SSDEEP

    196608:cZ0cDHdLjv+bhqNVoBKUh8mz4Iv9PeSEqu1D7AY:BiHlL+9qz8/b4IpxuRAY

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ZulyBoostrapper.exe
    .exe windows:5 windows x64 arch:x64

    2ac23c52e7647c5bbea38e98bb68c652


    Headers

    Imports

    Sections

  • R��)~Q.pyc