General

  • Target

    JJSploit.exe

  • Size

    7.0MB

  • MD5

    4fa2ed6e64d78da0018800e9ef2bebcc

  • SHA1

    6cfcc7b33e6f13ca85b30d5cd7dd258bba7dad4c

  • SHA256

    107fe68c6613f4d67d2b0232c060273745667a352afe3dd4d1bbec80fdd01f36

  • SHA512

    271f595e84099fbe425c5e547d472d2fdd1c82338f9f38bab88092d5803f3947e4a9db4c25832eb0b99248edfd1f2de2e7718291e9f7c8eccabd2aa9dfc825be

  • SSDEEP

    98304:F7eDjWM8JEE1FbIamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIU:9e0feNTfm/pf+xk4dWRimrbW3jmyR

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • JJSploit.exe
    .exe windows:6 windows x64 arch:x64

    a06f302f71edd380da3d5bf4a6d94ebd


    Code Sign

    Headers

    Imports

    Sections

  • mж���.pyc