General

  • Target

    LLR Logger.exe

  • Size

    78.6MB

  • MD5

    ef2f4f5beae8fa47a116d817ff96e7d1

  • SHA1

    963eda8b868061d7f6190d9e172c9485c6ca7748

  • SHA256

    5e433b412c346794c83637cb7ff61a660322b0be7bc74c5c06188aa35c0c1e42

  • SHA512

    bcfd05b52b7b778fa0c5e09db253b7517639254d33dcf1777d9a426a38cdda39e54af5477decd44a7fb8816736cf19447ecec27d75f1837d12f857da5d836f41

  • SSDEEP

    1572864:p2MbiJR5Q3jZDeSk8IpG7V+VPhq+ME73jC/WlsnghowmaOllkWIawZBxWBqX:pZbC+ISkB05aw+tuOsghfxOllkdawZnb

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • LLR Logger.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc