General

  • Target

    walterfn revived AGAIN!! unsigned.rar

  • Size

    7.5MB

  • MD5

    248163ed4affcbab61509daba1c63c1b

  • SHA1

    4f3e6bbb9eb63a91204e2bea09a531818187fefd

  • SHA256

    926aaf413202b89c532a7e7f4faa364fbe44d90f53dfa00b6af04de785c644e8

  • SHA512

    ee067c82751febdd791bc98cb6e12ae0cf386708fc2acc081058a99afbb8a0159a2c7150401f6848a5bcd67997d273c0cd6c55c4870d4a466e063056293cd0c3

  • SSDEEP

    196608:8gbI0Zjj0F98dkyJOv9GyKXCua8+OrtLXC1zCqc:PbI0Zjj0F98dnw7kCua8/FXC1Pc

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • walterfn revived AGAIN!! unsigned.rar
    .rar
  • WalterFN REVIVED perm and temp.exe
    .exe windows:6 windows x64 arch:x64

    a06f302f71edd380da3d5bf4a6d94ebd


    Code Sign

    Headers

    Imports

    Sections

  • ҫ�'�q.pyc
  • dependenecies/AbstractOptionSpec.class
  • dependenecies/AlternativeLongOptionSpec.class
  • dependenecies/Color3f.class
  • dependenecies/IllegalOptionSpecificationException.class
  • dependenecies/OptionArgumentConversionException.class
  • dependenecies/OptionParserState.class
  • read me.txt