General

  • Target

    R_FpsUnlocker.exe

  • Size

    7.1MB

  • MD5

    c2242d6fda13d4774085709175725d6e

  • SHA1

    317ed8b5abcac136d3e8aea09a809383d4f85cd3

  • SHA256

    19faeffcf0c6a5293ac801c3c2b6358f6d0d32ee6b6b1c4b3303a07ca751ffa5

  • SHA512

    52b987f139d933bd684f32ead353aa1c58bf1d4d464deb28720f1ee4ad277fc9d252b5d071e913857a1bd9c1ebd1406653d4274076d9c5a490b4a7ac7980dd5b

  • SSDEEP

    98304:1XzHqdVfB2GyuT/9vUIdD9C+z3zO917vOTh+ezsNhx5S2zh/hQq8mM/ZzqNMIfK:1bQsGbT/9bvLz3S1bA329OqiZQMB

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • R_FpsUnlocker.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Code Sign

    Headers

    Imports

    Sections

  • loader-o.pyc