General

  • Target

    Wild client craket by fanaudi0.7z

  • Size

    8.3MB

  • MD5

    b67962955b88b5420aa5acbe7ba4f1c6

  • SHA1

    e3dcc42f1daba0440b8561bea1d5374d87a66886

  • SHA256

    f126f0b947071da24d83f05df69b7245b80e9daca6dbcf9b4f787890e8060348

  • SHA512

    4f9a2c532c2e15322014ec29d546bbd8ee8f1d284c30c54aed20b27d61bba2c61755238bf8c56513e2092abf29dc12cdb261a7257a64efe329b398837ee4347d

  • SSDEEP

    196608:9hOQCNQma/J+/Tz+hjB38z0PFx0ozDoBXnTwoLtr0pNVeLOZVn:75CNO+/T03LFySoLr0hnVn

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Wild client craket by fanaudi0.7z
    .7z

    Password: 123

  • wild.exe
    .exe windows:6 windows x64 arch:x64

    Password: 123

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • ,���rQ�.pyc