General

  • Target

    Nitro.exe

  • Size

    7.5MB

  • MD5

    5467739498d2eb3e3fcd9e3db8e37bf9

  • SHA1

    aed987e92c27819f4f133e199e8aecf4ea4ad382

  • SHA256

    67808dd8311955a0bab507868874f1ba8fd987c831d6e122c16d1cad14c2bf25

  • SHA512

    8d8b500b272c12c30d8a0a34006c9cc2ecf8b09914ebaf7de1718fb2716ade05c1ed5ceb521f551048948cba5d261f7fdde413305ecc91029971d997334d078e

  • SSDEEP

    196608:o0gFnwfI9jUC2gYBYv3vbW5+iITm1U6fR:yFsIH2gYBgDW4TOzJ

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • Nitro.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Code Sign

    Headers

    Imports

    Sections

  • ��5� .pyc