General

  • Target

    DiscordGrabber.exe

  • Size

    10.0MB

  • MD5

    c0853265977dd273863945be5d523bd2

  • SHA1

    dbf9c4d6e98b3a37052ac7e7cb3efeba7e50fbdc

  • SHA256

    fd678c16168a280d2e9a51691079b6cbd69d936edd24bea96f0b308c7b82b5a8

  • SHA512

    8af42cab60123633fe829df7168569a5f421fdfc04f61acabc1de2ee92e850418b5b64a15f1851018dd467fc925d3e82450af45157e0e8e014c8bb5b4bcb451b

  • SSDEEP

    98304:hwEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGK4RoQBgV3ojyD:h3FFeN/FJMIDJf/gsAGK4RoQi8yD

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • DiscordGrabber.exe
    .exe windows:5 windows x64 arch:x64

    ba5546933531fafa869b1f86a4e2a959


    Headers

    Imports

    Sections

  • ����r:.pyc