General

  • Target

    Injector.exe

  • Size

    14.7MB

  • MD5

    c2d8f20eda81d71d12138ebee46f5ef4

  • SHA1

    584275537f254941be64c19dc4add6e4be0360c6

  • SHA256

    76e093ac3fe4836269a489e2ae00633e05bcc5d84c4b7a04eccacea60326bac7

  • SHA512

    79c35c981b0ebf626df2af6258a706c536b0b1c0a3af42d909316433e337513880c0ec4cc6253176a4c9204ca6118d668f4d1d4a79b81edc2e7f1ab0d183d727

  • SSDEEP

    393216:LiIE7YoPQ05dQuslSq99oWOv+9fgBBCbwiR:47rPQQdQuSDorvSYBB5i

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Injector.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc