General

  • Target

    BootstrapperV1.23.exe

  • Size

    24.0MB

  • MD5

    cf62df1af5d22c1123a014565beddc1c

  • SHA1

    c83fcc9683bf2dc80dea73971db0d207a9ab4bba

  • SHA256

    4358dc8f02e6759b228f88157ac7249d0ae502416e4e1cd58076cae8d45a982a

  • SHA512

    69b678ed0dbe5950681ec443fe19aa38f0d796cecd457f3ba089bec8cdd3cd49380382716ed5e120e01853f899c6f1edb68d5b426afc90f9c29bacdbcf837904

  • SSDEEP

    196608:Z00OhPxe+ZeNTfm/pf+xk4dWRpmrbW3jmrI:oUFy/pWu4kRpmrbmyrI

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BootstrapperV1.23.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • �R��;.pyc