Malware Analysis Report

2025-03-15 06:39

Sample ID 250213-tglrfazrcz
Target builder.exe
SHA256 394a76cae20c6d644a5f9a12099b48ee2058f6b03ff3f83805bb5d078248cb8c
Tags
pyinstaller crealstealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

394a76cae20c6d644a5f9a12099b48ee2058f6b03ff3f83805bb5d078248cb8c

Threat Level: Known bad

The file builder.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller crealstealer

An infostealer written in Python and packaged with PyInstaller.

Crealstealer family

Detects Pyinstaller

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2025-02-13 16:01

Signatures

An infostealer written in Python and packaged with PyInstaller.

Description Indicator Process Target
N/A N/A N/A N/A

Crealstealer family

crealstealer

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-13 16:01

Reported

2025-02-13 16:02

Platform

android-x64-arm64-20240624-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A