General

  • Target

    boost discord.exe

  • Size

    16.2MB

  • MD5

    109b9e7e5e896055f857122982098337

  • SHA1

    296ebbeb150b9679cc1a2bcc90f6389a64652cdb

  • SHA256

    16beec9f31c8a58ba631c443cdf1dc777efaf2f8d757ddc5712665d2ae62be76

  • SHA512

    e37ffc7fb590e5ecd95f824974bcddd39d187a71b086ebebc142499b3e4dd761f910631bb3e649bde49975a07c9469a81dfc232bf6aa2526e868951f3a9b5ccf

  • SSDEEP

    393216:FEkwGV2LFgpgPYVnNSMF1+TtIiF/ZxSXNsIGZGXHTL3N:FnoFgpgPQH1QtI6Y2IbHTL3

Score
3/10

Malware Config

Signatures

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • boost discord.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • cstealer.pyc