General

  • Target

    c6f0f99cc13f43faec361c2ef850177fcd6913cd8a191cc07b74b9f42f3b0c98

  • Size

    5.8MB

  • MD5

    3337483bb7cf06984c04d54ba435b9dd

  • SHA1

    d4c5850f2da242881e12a2f9c3eede137b594d1b

  • SHA256

    c6f0f99cc13f43faec361c2ef850177fcd6913cd8a191cc07b74b9f42f3b0c98

  • SHA512

    146a236808b2a7de232821dcab841c4cf856a9e07d03ecacbebfcba5126ba95df0cf93c93ca6540247ae094ba964584b872e92dde56f6f8719ae03c8ed82f37d

  • SSDEEP

    98304:6ENbOAuR6kSk8UtWndYIuq8WhqulXPW/8KT8pqkZLNvMP/0P9SU+EyEn9o0ta8Tc:6ENbOAuk7fUtWndYIuuw/8CSNvvP9SUS

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • c6f0f99cc13f43faec361c2ef850177fcd6913cd8a191cc07b74b9f42f3b0c98
    .zip

    Password: infected

  • Dlscord.bin
    .exe windows:6 windows x64 arch:x64

    456e8615ad4320c9f54e50319a19df9c


    Code Sign

    Headers

    Imports

    Sections

  • <�f1��.pyc