General

  • Target

    Dlscord.exe

  • Size

    6.0MB

  • MD5

    701261310f04aeb5eb7c4a755ad922e2

  • SHA1

    32a1332c3c2d687a26c3561f407ced82f867a343

  • SHA256

    8df9e4634f675cc1f9256f0f432948470c64c42fa981c416af686a98b94e959e

  • SHA512

    54bd2bb749b1f80811a21e727f6dfda48727841040b71db75e14ea59e4600696f9b19322ec00693ec0202f955d13ebbd74f64439d3edafceedcfba196686214b

  • SSDEEP

    98304:1BEtdFBGxamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RLOuAKcghsm:1AFEMeN/FJMIDJf0gsAGK4RauAKcssm

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • Dlscord.exe
    .exe windows:6 windows x64 arch:x64

    456e8615ad4320c9f54e50319a19df9c


    Code Sign

    Headers

    Imports

    Sections

  • <�f1��.pyc