General

  • Target

    Red engine.exe

  • Size

    6.4MB

  • MD5

    9b61b8c4b9a0dd9ebabba037f3e40d6c

  • SHA1

    de13eb6cc7b33c93d78476e85d919345284b6683

  • SHA256

    af166865004ceef35372a56dbb089aef01a5e7164ddd24bd133c845c839a6684

  • SHA512

    8a61241299a75ff248d4c7ed0c24d42249e2226ffa4fe153f95f49212bbcefad83fee62526087f016f073ba6a1e24a1b1534610ca9e9b832e71df6797fc488ce

  • SSDEEP

    98304:VSEtdFBghamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RABMgWb3Ks2Td:V5FZeN/FJMIDJf0gsAGK4RAugC2Td

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Red engine.exe
    .exe windows:6 windows x64 arch:x64

    Password: 1234?

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • ?��G*p�.pyc