General

  • Target

    Flash BTC.exe

  • Size

    14.4MB

  • MD5

    b02dd3b5fc68acf082a094b3318f1bd1

  • SHA1

    75d4b38d0d3711553d73949ffc4412dfe54340c0

  • SHA256

    f6365e1960122f4fb1775603b5ceb9798d5cc7aaf0e5c9e0b96fe4f1f1efe51d

  • SHA512

    8f524ee0d09df87a449f8758733adb0d529371d1b140cbdb0197563f8b954991a7ff5e9849d71bb662509eaf57d43c3dc94015cbe22354f5965239252ec34c26

  • SSDEEP

    393216:hX7QMidQuslSq99oWOv+9fgjmAVe+mGw:hLQ3dQuSDorvSYjmx+M

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Flash BTC.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc