General

  • Target

    stresser (3).exe

  • Size

    20.0MB

  • MD5

    6d30b843fe610dce043d0429a9b98850

  • SHA1

    dbe582d967d31cbfbdfa456172c00e53a96776a8

  • SHA256

    b5fccf55ac7b048d368548d17073a4b5eab22115ee261444ea64e0647d759c41

  • SHA512

    06568af7c72f5dd63361c813d13172a7fcf3e99df7a32fa922a70f84e6ee834d884218ba42481a02b34e1925518c5fc40f4c1b8f55f5534f5830cced0e22920f

  • SSDEEP

    196608:QNYS61OshoKMuIkhVastRL5Di3uh1D7J1:4YSqOshouIkPftRL54YRJ1

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • stresser (3).exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • 4{��+�$.pyc