General

  • Target

    RYCCC (2).exe

  • Size

    7.4MB

  • MD5

    54fc29dea207d04ad17fb681938ebf6f

  • SHA1

    6d65f77dc3bebed287e44797109e399030025669

  • SHA256

    831d7313ac67c8f1c22c5eb2ba92d390243faf2530b51cf2ee757a9c69b780a3

  • SHA512

    a8f0d2359d205bb756ef5253322f4401844e1c7a7ece17dc37c83e597760866d0bab470c13d2587c932b4c3dc1766944dbaf756d9817c4578d7e073fd3b50002

  • SSDEEP

    196608:AwmDZsSG14RRHvUWvozWOxu9kXwvdbDlA03NhnGetp8wPhUaPlw:RGTRHdKbAlbZA03bGM5ZF9w

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • RYCCC (2).exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Code Sign

    Headers

    Imports

    Sections

  • gߪ 9�r.pyc