General

  • Target

    BoostrapperV1.16.exe

  • Size

    29.7MB

  • MD5

    e856ee873dfbdf2b64d6fb9bc990b51f

  • SHA1

    30aa67b07351fec82917628e98fe90dcbe9787fc

  • SHA256

    fc6af8e39d661cbef47d439dbbfa55488a8d20823e0021d0975466ebdc6855c0

  • SHA512

    6f944887a0fbb0560cad08a87e361d41de9654311ec3352b86b3f29e799cdf484599caf3b7a41ab6dcc3819a41ddcac6fd5c186fce9c041eec7dfb6d3be62cd9

  • SSDEEP

    786432:CCL0QfygPQgdQu/DorvSAdcrABxHCWQ1CdbdK1Jo:yQfy8VuHdcrAPbQ1Cd

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Quasar family
  • Quasar payload 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BoostrapperV1.16.exe
    .exe windows:5 windows x86 arch:x86

    9222d372923baed7aa9dfa28449a94ea


    Headers

    Imports

    Sections

  • ��.pyc