General

  • Target

    Solaris Executor.zip

  • Size

    75.0MB

  • MD5

    2582b95acdd29d87d13e5bbb177ce7b0

  • SHA1

    bee4878687d1167b4c47f97bc81a5672b6d7cd67

  • SHA256

    62fd7c23d64d6897325cd9084b9821ad7f812bc6ddb9d56d116121efbe1177c1

  • SHA512

    cd4681449f173edf69b42777afa8647456440496c608f35955a12175b4664c462a34dba315fcb67d03f67ec8b446bf5542088e685741e071a5377a06d85ada2c

  • SSDEEP

    1572864:hHBIuyN38S2AxUrjMFZNyq72xXG3G7RYEefcvV3WSJVvnDoERfguH67d:hHBIjV8SbWH8wqV3Gt4cvxvnMExH67d

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solaris Executor.zip
    .zip
  • Solaris.exe
    .exe windows:5 windows x64 arch:x64

    2ac23c52e7647c5bbea38e98bb68c652


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc