Resubmissions

18-07-2024 14:50

240718-r7nbvawflc 10

General

  • Target

    XSpammer.exe

  • Size

    17.0MB

  • MD5

    f1efe5722cd8397bfec9e5f5d4db3a9f

  • SHA1

    98b6cbaaa04fba418cdeb53a0b3de6f375a3d210

  • SHA256

    0bc926b1734257ed2282252670bfcac9484b104fab9bcd7d8e7dc6c535121ffd

  • SHA512

    5ecf04b4f79a44603304960dc78096296035b6985f0e4e28c4da2610576becd603503fc436ab20e2f2c8f8e183281d6ae6fbb1238008df7f453b124521d1320c

  • SSDEEP

    393216:qiIE7YoPQwB9dM/IS+DfDgrc6Zc9f23Pj:T7rPQwBT6IS+b0IB9fgP

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XSpammer.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Boobies.pyc