General

  • Target

    lvVysTc.zip

  • Size

    8.6MB

  • MD5

    d001b3303da444021e26c1f67d52b433

  • SHA1

    6236627fde1667659bbb784fc31249b754e41109

  • SHA256

    55076d193e58d93e5004fd85c807f7a7ba284e028ffcc2b757769162b4a2bc54

  • SHA512

    6a840b729fd007a11b1cba9731fafb47d694ecc7571d6444c7541283113fda2d6d761a5d244948f1cfc581ca4f93970814368fa5786ec0904138523b0c873cf5

  • SSDEEP

    196608:XBkLDwH4bLsCBWEHtq40Z9g9iXHWspX2mwSklMEAIzp+vBQ0w5t:Xo04VBWgtH0Z9g9e2YT9klXo20w/

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • lvVysTc.zip
    .zip
  • lvVysTc/Randazor/Razandor.dll
    .dll windows:6 windows x64 arch:x64

    3a1f9d973bff43051a3daf411f707362


    Headers

    Imports

    Exports

    Sections

  • lvVysTc/Randazor/dangert.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Code Sign

    Headers

    Imports

    Sections

  • N�%���.pyc