General

  • Target

    discord server boost.v2.1.exe

  • Size

    37.0MB

  • MD5

    1545830e36a0fa53d13bad44445c3c55

  • SHA1

    d60743940b192ed78306e088e744868d496e2ca3

  • SHA256

    20e210f2476523bde90860b287f969523837a8015baea9e4df8ffeea8207dd11

  • SHA512

    e5a0c8e040deab9fcfe39975f82ab9a6988a3155094fbbc881c8ced546658b42431f119fc85bffdaeb85a986cf2ccf30c5d73af9acccd815ced862b5448ec863

  • SSDEEP

    196608:Fj6QXwuLsurErvI9pWjgN3ZdahF0pbH1AYSEpzCtQsNI/Sx3mUc:ohurEUWjqeWxQV6nAvc

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • discord server boost.v2.1.exe
    .exe windows:6 windows x64 arch:x64

    456e8615ad4320c9f54e50319a19df9c


    Headers

    Imports

    Sections

  • m3q���.pyc