General

  • Target

    Discord token gen.exe

  • Size

    25.0MB

  • MD5

    64b3a0dd679d3625721209e74a7e1865

  • SHA1

    e6f335cf19c6ac26c25255d62cde381152d83c25

  • SHA256

    fa069d5f6160f48d9d32833fd6fdd7cb22f94e28f197c87d7eaa9332fd17ac5a

  • SHA512

    415ce93799259f9992b190a168a38e1cfc4dc2e24e814aff337785264ce2a595701768b4306b5bce2c1ae0a9a60cab947e42af1c5b4a08c2043a6a943e8af0f9

  • SSDEEP

    196608:wPFEHgeN/FJMIDJf0gsAGK4RMuAK4SQkl:T/Fqyf0gstPAKX

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Discord token gen.exe
    .exe windows:6 windows x64 arch:x64

    456e8615ad4320c9f54e50319a19df9c


    Headers

    Imports

    Sections

  • �r�!q^.pyc