Overview
overview
10Static
static
10ImageLogger.exe
windows7-x64
7ImageLogger.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 00:39
Behavioral task
behavioral1
Sample
ImageLogger.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ImageLogger.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20240226-en
General
-
Target
ImageLogger.exe
-
Size
76.4MB
-
MD5
c670c67a1991703cc8d23899c6cc5dfd
-
SHA1
ebbe19b62f3a012b6db6fcb98da518609c9ad916
-
SHA256
d23acf9b80b8e55860bbf782989ca483f3e90ab6d16530b3078c1aa533c04164
-
SHA512
6fb4cd3406059c6eec1983c1848be20d6794c22b9f0742ddcf269860cb7a1e7520be695bdaca7421696ad8adadb1af988e8797becf836a2f37f9d3ff5c0f661b
-
SSDEEP
1572864:/viEZjFjESk8IpG7V+VPhqYdfME7mjx6iYweyJulZUdgu0WVKj9egOqZ9U3:/vZZWSkB05awcfQtnpuK0c2j9U
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
ImageLogger.exepid process 2596 ImageLogger.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI19362\python312.dll upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ImageLogger.exedescription pid process target process PID 1936 wrote to memory of 2596 1936 ImageLogger.exe ImageLogger.exe PID 1936 wrote to memory of 2596 1936 ImageLogger.exe ImageLogger.exe PID 1936 wrote to memory of 2596 1936 ImageLogger.exe ImageLogger.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD573ecc8d4decf6f198d6505bde482e37a
SHA1ed30f5bd628b4a5de079062ea9b909b99807021c
SHA256b598545be6c99f7db852a510768ecf80ed353fad3989af342bc6faf66fd64648
SHA51256923c477d35680aed73980e0404768f841da868ca11f39888caff0fc06f4ae906551b4bd47f98dda2cc2d81ea9eed17fa7c17aa59d4d7c37510ba24d7ac5976