General

  • Target

    DiscordGrabberTools.exe

  • Size

    17.4MB

  • MD5

    7c0cda8d86f73c4be7a39f4fd6ad05d4

  • SHA1

    158591044d3aaafca4fde959fef49a0b42076432

  • SHA256

    a30d636180a4117dff04e748324214dbbfd852cf68238b6c991814d0ba875729

  • SHA512

    57b02340e18c500c5b9b2839c007a0b19cf8cedcb308a73a88a7aeb4cf4208a661e7c6ab53582827c365d0360bab02d2ee346e35379d564f89ba9e9846bcc808

  • SSDEEP

    393216:2EkZQtss271IW+eGQRj93iObIhRS/MLJrqr6oAd8XTn:2hQts7IW+e5RB9MhR9den/X

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • DiscordGrabberTools.exe
    .exe windows:5 windows x64 arch:x64

    2ac23c52e7647c5bbea38e98bb68c652


    Headers

    Imports

    Sections

  • Ethical.pyc