General

  • Target

    Account+Method.rar

  • Size

    5.8MB

  • MD5

    9b1d27072831232af5b059ebdbb11e37

  • SHA1

    ae5d6cf5b6e60a1f0a35c822abf154834613bdea

  • SHA256

    c3274c67cd9594d982eea6251030707b767a675d5c76ee08c8d9be9575b50552

  • SHA512

    789390a3c1809b26fe24b85b6677f8faacf011786d90d3b4c7987fffe4c16c2d7a2a5cb5342d00529fc4d6c7f21ada9884858f276c1a42f1fad6772f1558c62d

  • SSDEEP

    98304:zLl1r0VhWdwt29Hy1UGwcjPPed7cU5gczfQZ8OOnyRbHlcrEE9BS/KX0gqwVH5A5:vl1qhgH1vmczfQZrOnirOEE+80grVzc

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • Account+Method.rar
    .rar
  • Account Method.exe
    .exe windows:6 windows x64 arch:x64

    456e8615ad4320c9f54e50319a19df9c


    Code Sign

    Headers

    Imports

    Sections

  • ���.pyc