General

  • Target

    My_Singing_Monsters_Supernova_Histories.exe

  • Size

    14.4MB

  • MD5

    f73d86d8e4a0ff4046a0f830b2908adb

  • SHA1

    98747291e14f9a5ab1a1f672b82721cd542f805a

  • SHA256

    8b9edb3a35c74557d8381368f0ab0ed64f3e20b2e2f1e9fe22f4f3edf89d556c

  • SHA512

    ae07659435de558a2cac6b8f6682e7d11e47eb4439c3bb329a00b658993b1582dd243df3a5577d8d6b276311725a2f38e40f413087f7a75ae48a21c34cbb8b4a

  • SSDEEP

    393216:LiIE7YoPQQdQuslSq99oWOv+9fgcTeiUW/row:47rPQQdQuSDorvSYcTeo/5

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • My_Singing_Monsters_Supernova_Histories.exe
    .exe windows:5 windows x64 arch:x64

    20d446c1cb128febd23deb17efb67cf6


    Headers

    Imports

    Sections

  • Creal.pyc