General

  • Target

    21071068560.zip

  • Size

    55.0MB

  • MD5

    0d0b3a00e7bf055282ceae7726ce251a

  • SHA1

    61017e694ae8036eccdf38e661930fd0415851d2

  • SHA256

    b9b8c850493be6e607e8889371bcb565ac25fada7d27cca10230e50b253b3cd6

  • SHA512

    2fc48b0d3c4bf7a831483c608a9cffb83aa11c637a68e5daf98792c7b637e1bcd77833e32f2325dd492b0ca77e17670680fe81cf96975c5d59fb2738ab614127

  • SSDEEP

    1572864:UQ/J+ohl1sQ8m549qpfEBRs6B1X8Hol8Bvgy5BOJ:D+8lK8SqpfEBRswPiB4OBOJ

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects Pyinstaller 2 IoCs
  • Unsigned PE 11 IoCs

    Checks for missing Authenticode signature.

Files

  • 21071068560.zip
    .zip

    Password: infected

  • 14ed02af2bfe80834dd59bd49650f5c982da1a9bf2a437450ce113eb6fcf9ee1
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 166bcfa4ec03b68bc4ee3fc95806f6d155575be88cbc3c4b7aa5891ca3cc6a88
    .exe windows:6 windows x64 arch:x64

    a06f302f71edd380da3d5bf4a6d94ebd


    Headers

    Imports

    Sections

  • activator.pyc
  • 18f6e53cc27bda15c98f79e76f9210bf05b1d8528b96cf4c1523a7aeec7532bc
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 1ecdd2baa03fa76ba2313ef30be6678fda212eaf2878d8e2b9557ad2aec9f197
    .exe windows:5 windows x86 arch:x86

    97bb90440658f848690f8c488513f8de


    Headers

    Imports

    Sections

  • 259af5147b99b4c014aeb425aaf236fc76ab60f1aa06efa77027393854e5fff4
    .exe windows:4 windows x86 arch:x86

    5dc882c2547d7b74ff2e563856f72620


    Code Sign

    Headers

    Imports

    Sections

  • 4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316
    .exe windows:5 windows x86 arch:x86

    d0f09e6c76eee3e10435ab6ac6f52856


    Code Sign

    Headers

    Imports

    Exports

    Sections

  • 4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 57f8e4e1d3339c0abadc0f64fc6a4abaff19cd138724cdbb3fae5f37905547c5
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • 922cba3477ffa83332622df72c2e580fcb3bdd437952c4b6b2c096b4a094acc3
    .exe windows:5 windows x86 arch:x86

    0ae9e38912ff6bd742a1b9e5c003576a


    Headers

    Imports

    Sections

  • b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588
    .exe windows:5 windows x64 arch:x64

    b1c5b1beabd90d9fdabd1df0779ea832


    Headers

    Imports

    Sections

  • da5f0322d31a05d525ee8b37a748670be35647c692a85fdb8997742f5fed3524
    .exe windows:5 windows x64 arch:x64

    f4f2e2b03fe5666a721620fcea3aea9b


    Code Sign

    Headers

    Imports

    Sections

  • �A%�J��.pyc
  • ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • TrkWksrv.pyc
  • ff70347ce0294dc6741692164f65608d9bb47e396486c50da08a94a5b3cbe50c
    .exe windows:6 windows x64 arch:x64

    3f080e40199b31469fce5d2a5d945048


    Headers

    Imports

    Sections