General

  • Target

    gojo sim.zip

  • Size

    12.6MB

  • MD5

    f14b9be1cca335e23639445e8e78ac9e

  • SHA1

    ba0aea33cef6cf1f1dcf9741134ac58ae0c717e9

  • SHA256

    4b4c20c87e23a20ea3dafd57907ed3dbb38b65c88d0d15d60fb304228f44dbc4

  • SHA512

    c053d6009578f21e1774306de007ce44144e089f7c73a36ca79fe196590dbbba5c6bd3cbc4e58fe370222e12b46a1788994bbb3c078ca0305fbed2ccdaaa8c32

  • SSDEEP

    196608:z0guj1G8FoLCTt7VwkB8WggI9VD/ZV1InfNESKqDZQrQos4BAK4d41jOt1qejGPU:6eLAwwIgI95xL/C+AK4ojOt1qvOm85

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • gojo sim.zip
    .zip
  • dist/Gojo simulator.exe
    .exe windows:6 windows x64 arch:x64

    965e162fe6366ee377aa9bc80bdd5c65


    Code Sign

    Headers

    Imports

    Sections

  • ���ԏ�=.pyc
  • dist/auth.txt
  • dist/imgui.ini
  • dist/mapper/map.exe
    .exe windows:6 windows x64 arch:x64

    483f979857f4b50b4752c92a45247144


    Headers

    Imports

    Sections