General

  • Target

    SandeLLo Checker.bin

  • Size

    10.2MB

  • MD5

    a996231fc27b8fabfd2411d33d6c8b88

  • SHA1

    e3e1f4b33274cdd5e409d38e752a15652d4a495a

  • SHA256

    16429d3a929880548a2b2eed8c7d311250364d1fd3b7364267c1d6fc49759f87

  • SHA512

    3fa9c3a144163a6f5c7a665bae37efe72d62c9645e3bb8b7d2a96b941f961ae751bc602bbbe449314cc200011408d5800126f3092f432c94b2122ea90bc2c9f1

  • SSDEEP

    196608:gAA0leNTfm/pf+xk4dWRatrbWOjgKOzhg01dypSSJC1:g5y/pWu4kRatrbvMKO9l1dy1JC1

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Orcurs Rat Executable 1 IoCs
  • Orcus family
  • Orcus main payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SandeLLo Checker.bin
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • iD��9`i.pyc