General

  • Target

    $RU48J3W.exe

  • Size

    22.4MB

  • MD5

    db2fc8b748b8e9f5c76eb8701291e242

  • SHA1

    c9ca796b98a6c062b50156afc4aa2ad060761900

  • SHA256

    6a394dcda7bdbcb64d00bf21fb7fe80bd09d97c1bbfb8ac05129b8b454bc81b8

  • SHA512

    dad00a1bfe98a75d0452989adcc53adafa2e7983e1918b3fbe0cf1f9e3424c2fda7d078e700d1990b447378206523b4fcbb8c7c6c34b6e54068a6e32b4fc9bbd

  • SSDEEP

    393216:zxEkQRIQtsu4PU1+TtIiFTCuARuAQsFXmbBr1cD+VjuluU0+xbwmnCH:16IQtsDPU1QtIACuAgs8ByOya+x0mC

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • $RU48J3W.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc