General

  • Target

    Xeron R6.exe

  • Size

    9.0MB

  • MD5

    63a626f1a53aa4aab64a096245c4bca0

  • SHA1

    5d1c6049423e123d49d3226aa305ae517d04e9da

  • SHA256

    7b3000bfc5b7dc42803ed95814e170d758338421bd44e664d3257ba45baf9124

  • SHA512

    5aca9b5e28bcec00fd0b61c3c2d51d9b24a32d2190e49a8e387cf525aaff5a791e836d47720e8f0f4486040088c9c30cebc8168dfed999fd7aeac5eb91fe202d

  • SSDEEP

    196608:e5gCDwfI9jUC2gYBYv3vbW4SEA+iITm1U6fX:FCwIH2gYBgDWZ+TOz/

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Xeron R6.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • ��(�R�.pyc