General

  • Target

    IdaTest-[find the email].exe

  • Size

    8.1MB

  • MD5

    29e5ff275d9ab492ac370374d66b7159

  • SHA1

    bae80f520867e5059c215e46f597e19d3cbc4da2

  • SHA256

    89fbf3e4e9bd015fce5f4f4d7b4a45d46e5e3c17be699e7db9b24bd051ab5abf

  • SHA512

    f7323754351f17991e96282f9cfae88d897b5d271a9c41a2e2a0aeebcdbd8b20c1c59f7330992d14747fc6dd73d3d8c18ea409f1a3f352496f52471abf133568

  • SSDEEP

    196608:13Ez0+EA6RrIgkLjv+bhqNVoB8Ck5c7GpNlpq41J2ViC0YNkf2Hio6+9h5:1F+EjsL+9qz88Ck+7q3p91J6iC0JcM+1

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • IdaTest-[find the email].exe
    .exe windows:4 windows x64 arch:x64

    7330f475a1ba894c33dabb63cbd6403c


    Code Sign

    Headers

    Imports

    Sections

  • ���#�9.pyc