General

  • Target

    EAC BYPASS Paid.exe

  • Size

    18.7MB

  • MD5

    648c97eafe4de4a8bcd8decf592bb568

  • SHA1

    3639fd1a2c05c35e4177e9de302b124c04621b82

  • SHA256

    d1d884c04ff508d0b98dfbe2dcfb167feb63cd8a8708017664e54740ecddfa1d

  • SHA512

    6b2cbf76b76ec4c7c59695f38e30ad92c655ec2ac37b106fd6331f08fa22ae8f02ba8156bd623d871529af6ff5517d50ee4ab8d8356d6a3ac4d97613fdaefd57

  • SSDEEP

    393216:yqPnLFXlr4QMDOETgs77fGugztZLvE8s+ZgMkKq:3PLFXN4QRE7hUtZwsZy

Score
10/10

Malware Config

Signatures

  • Detects Empyrean stealer 1 IoCs
  • Empyrean family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • EAC BYPASS Paid.exe
    .exe windows:5 windows x64 arch:x64

    1e92fd54d65284238a0e3b74b2715062


    Headers

    Imports

    Sections

  • main.pyc