Analysis

  • max time kernel
    112s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2023, 01:12

General

  • Target

    Discord-Token-Grabbers-main/logger.py

  • Size

    1KB

  • MD5

    64a7dfb4adc591f5f196f34a1c468a61

  • SHA1

    4719b49ca08f619092493eacf190dac50716c98f

  • SHA256

    d658514488b6a1ed175aaca9b187cea895e512f41aecb0c5bd0f014eb681a128

  • SHA512

    bf427db71b1369435d0c39f19d1ef4cf8447bfcb201c889855026f8ab96fa2e6c39cdcdeb580e0c400a7e9b2426c8d830eb21967415afef2e751b1e186c75d73

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Discord-Token-Grabbers-main\logger.py
    1⤵
    • Modifies registry class
    PID:3288
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads