General

  • Target

    velocc spoofer v3.0.7.exe

  • Size

    103.8MB

  • MD5

    f4b0c10fe13fbff144136c8bed784e0a

  • SHA1

    252c41f218d5934a8da4c8ad52f5bda60a90367b

  • SHA256

    153f35c29ee5e4e1dbd882c36cbf291264b9df12c542203ae07454333ec1f436

  • SHA512

    2b739b1ee0e7bd41c03cde82480c0b4a083887b478dafd8f30735bf053fb5d60e063ed1d85ed5470de4c39dd48005d4f0c4f561bffa30a24f9eef9ad816345e9

  • SSDEEP

    3145728:cUbn7pa8S6xjKcBa6TnX3fztoJylnSlCJlChaAYY:Z7VBSWNa6THpoySklww

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • velocc spoofer v3.0.7.exe
    .exe windows:5 windows x64 arch:x64

    2ac23c52e7647c5bbea38e98bb68c652


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc