Resubmissions

14/06/2024, 17:52

240614-wfyeysvapr 10

14/06/2024, 17:51

240614-wfl2xsvanq 10

14/06/2024, 17:14

240614-vsctcatbll 10

13/06/2024, 16:52

240613-vdwmxa1cmr 10

General

  • Target

    Inuria.exe

  • Size

    6.9MB

  • MD5

    11203ba4b8f89b5784eb173281f778c7

  • SHA1

    c4759ae854553fe9d32fc1e057128ef13c4e6374

  • SHA256

    999f35359da0bd02255c48f70bfd0e270c7958805aa5d5abf0f22875b6d16569

  • SHA512

    4d70ccfb50ca0f4152410bbbf04dc8320c435781208dd5d3569f5c22e5497caf6dc61fb613a5000244f8edf92dd30b422e3407e38248e10b8584bac860d06893

  • SSDEEP

    98304:HDzHqdVfB2FS27wgyuT/9vUIdD9C+z3zO917vOTh+ezDNh7JvmJ1nmOBN9n4mdK1:HvQsFbT/9bvLz3S1bA3z4n97Yp

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • Inuria.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Code Sign

    Headers

    Imports

    Sections

  • �7���.pyc