General

  • Target

    spoofer.exe

  • Size

    52.2MB

  • MD5

    1cb1bb0671a8963d0f565b4adab1575a

  • SHA1

    29e5e75db8f20083e490ec92d5075651ca040428

  • SHA256

    3db37145afa6deae19d647cddb3fafb8e3b2578b127d3de38c02dc1557e8c53f

  • SHA512

    15a96fe01af5d3024cbbda33a68aa69b0dc7fbaaeae3b1e8b2fed1f0e68e1ac429f63fe9aed6cec807a46a4606d72692a6db85d8911866595abfca102e6f8c0a

  • SSDEEP

    1572864:6vHcRl0Sk8IpG7V+VPhqYdfME7FFlHFudW4Ljzux3:6vHcROSkB05awcfhd0dR3a

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.exe
    .exe windows:6 windows x64 arch:x64

    456e8615ad4320c9f54e50319a19df9c


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc