General

  • Target

    Injector.exe

  • Size

    16.3MB

  • MD5

    e0ec4f575f876e515f7f56e372fa1142

  • SHA1

    7a7a5a5fa0b2fa8a6a782f9f27344a1db40fb859

  • SHA256

    43725dbdc733f409e34f9cd8c2daceb2d1b5c2baa2a5663452166522ff794586

  • SHA512

    d03bf3ff1182c1764dc8e912229b0bf202660f29356890777bd36864a96b8509e8c44a2d2b9100041fa591f50f0609d43e8519f61fdcf8517827deacd9f3735f

  • SSDEEP

    393216:I9YimSsewq3Obs2CltXMCHWUjurRQ7XbFsn6dEahcyorChF9DA33JX2E:I9YimRewq3ObRqtXMb8urRQ766dhcyo7

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Injector.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • Ethical.pyc