General

  • Target

    KEYSER C14CK 1.2.1 by vujr.exe

  • Size

    28.9MB

  • MD5

    c9ca42eddbb644e6bb0f0ae75644550f

  • SHA1

    9d1e6197e0803c5e7ae5943635b8bcb3d0bf1e0e

  • SHA256

    95976390f84c36983964665b810433b3016e421d221a4c83cb49dc98b5ca8a99

  • SHA512

    a4e1d993d7fcfc31086dc12dc2f69ad2401eed669a0a638d3ef9c5aae13b719569afbdf9763dd75d53a818288d3161b4d80dac9ec3784dbdd847980fc8f87de4

  • SSDEEP

    786432:muqJow/lOW8ZwfX8O8l8dPXAbjlsoxCXF1R7Zn:muelOWQwP83lmPwjlsOC7RR

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • KEYSER C14CK 1.2.1 by vujr.exe
    .exe windows:6 windows x64 arch:x64

    Password: 101010

    965e162fe6366ee377aa9bc80bdd5c65


    Headers

    Imports

    Sections

  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc