General

  • Target

    spoofer.zip

  • Size

    7.1MB

  • MD5

    2ec4fdcc1f63f0e6fe176141c414ed8c

  • SHA1

    a140750e6c8f5c7a38bcd41ff12016d2c410a752

  • SHA256

    21002feec9c8e0fe3ff443d10762fd1a00959aee9c857ca14199d45f7254d391

  • SHA512

    bb168a478926280f5904a446e379dd686ccb7a0876007424af34efa6eb0c43527e6f4d9415868ec9ba3ae2406581e0e591ec8f04c3890da35a23c03085bf9365

  • SSDEEP

    98304:xQzHqdVfB2FS27w9syuT/9vUIdD9C+z3zO917vOTh+ezDNh7bvmJ1nmOBN9n4m4n:xYQsvbT/9bvLz3S1bA3zin972

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.zip
    .zip
  • spoofer/save.exe
    .exe windows:6 windows x64 arch:x64

    456e8615ad4320c9f54e50319a19df9c


    Code Sign

    Headers

    Imports

    Sections

  • }�_I�F2.pyc
  • spoofer/spoofer.deps.json
  • spoofer/spoofer.dll
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • spoofer/spoofer.exe
    .exe windows:6 windows x64 arch:x64

    6a91eb82bfd19d2706c7d43c46f7064e


    Headers

    Imports

    Sections

  • spoofer/spoofer.pdb
  • spoofer/spoofer.runtimeconfig.json