General

  • Target

    discord token.exe

  • Size

    6.6MB

  • MD5

    2aa93eaa25143f2426ee0f8ba05886d1

  • SHA1

    d6fb49bccc6032d7c1d2306018cf661f41a5bd70

  • SHA256

    f17cf023c102ae76ac92c94a885094522c3c6b176d93deddd16b7328ab0c82b1

  • SHA512

    8af5e258dfb22a21fc895993c0cc6712b02610f4cce3d511790da5d2271225d3a6b2af92806f4022a23c2973b6b4e74c1ed6e2ab34821baa795cc94cf952f2f6

  • SSDEEP

    196608:7KZ2UDOYjJlpZstQoS9Hf12VKXMSERbuCOv3:XUBpGt7G/MymbC3

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • discord token.exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Code Sign

    Headers

    Imports

    Sections

  • �c�c���.pyc