General

  • Target

    matcha-version-b7eebc919e96477a.zip

  • Size

    18.3MB

  • MD5

    c3300222aa84a4e1d37946e95e6d3017

  • SHA1

    c777c09abc7b6b51a7b35185ff1e15afde719577

  • SHA256

    0cf7211f99b8aab9d62160266425b6413b4f5050778bbbfcdd916fb1fd57d0d2

  • SHA512

    08feb3ca784cda55c4b2991c657e9d98b64594fa9f4acfc62541db5c0aeb7ddee65836438a372734ff1b21290a00cc50dd224f95688c36a3d2c5f9fab6cc1d59

  • SSDEEP

    393216:J8g/BmHdfUM1f/5PaV743SRFUgmNy3z7CiXFvFiKEyJpmuZdsOC:J86mHdr5Gj/mNyD7CiJgKbmu9C

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • matcha-version-b7eebc919e96477a.zip
    .zip
  • README.txt
  • loader.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Code Sign

    Headers

    Imports

    Sections

  • X8��%~l.pyc
  • mapper/map.exe
    .exe windows:6 windows x64 arch:x64

    d4189bdbc7330204c7948547efc19ada


    Headers

    Imports

    Sections

  • mapper/matcha-driver.sys
    .sys windows:10 windows x64 arch:x64

    8793f62fd8e4d4224015005da3e802d0


    Headers

    Imports

    Sections

  • matcha.exe
    .exe windows:6 windows x64 arch:x64

    2ea3ef7cb1d04c06b106c3a9e2cf5290


    Headers

    Imports

    Exports

    Sections