General

  • Target

    e9f868d54dc0cda5bd4e13ad4fb6c7861b339024cd28daf0dc8eb9ee69a405fe.exe

  • Size

    8.8MB

  • MD5

    9a1a0974a7201deaa019697cb0f137db

  • SHA1

    18095f2009c5e70970272a9c2a5cb6a538f84d82

  • SHA256

    e9f868d54dc0cda5bd4e13ad4fb6c7861b339024cd28daf0dc8eb9ee69a405fe

  • SHA512

    b1165edcc521cbd8f7c03113a0138befa70f4b77d5f427b36e231cbb6d665dc28b10c6848666dc6cba6868974027044d32becebc352e25decdc87b9f53b3501d

  • SSDEEP

    196608:rFHY9wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j5inz:zIHziK1piXLGVE4Ue0VJInz

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e9f868d54dc0cda5bd4e13ad4fb6c7861b339024cd28daf0dc8eb9ee69a405fe.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • ->�C��.pyc