General

  • Target

    luncher.exe

  • Size

    14.4MB

  • MD5

    53c2997ea469d03c7e4162194e76c5c1

  • SHA1

    6cb592df6269f95de328c744498ad54a490cde54

  • SHA256

    f13b643cafe7e49fe2a71f8f3ae47506035b9faee0d39f05002fa85d82258135

  • SHA512

    2420d11765944c7d755de527fe4203588f3b9de641eb37088e4fee80a01ff96ecd050b83adbfc3e252004cef121c784842d39869d9664863c107d720af1a1576

  • SSDEEP

    393216:eu7L/sQPndQuslSq9RoWOv+9fggkD8ejQaE:eCL0QPndQuSborvSYgi70

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • luncher.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • Creal.pyc