Overview
overview
10Static
static
10Spoofer.zip
windows7-x64
1Spoofer.zip
windows10-2004-x64
1Spoofer/Spoofer.exe
windows7-x64
7Spoofer/Spoofer.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Resubmissions
19/10/2024, 20:28
241019-y9crfsygrq 10Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 20:28
Behavioral task
behavioral1
Sample
Spoofer.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Spoofer.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Spoofer/Spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Spoofer/Spoofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
get_cookies.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
misc.pyc
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
passwords_grabber.pyc
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
source_prepared.pyc
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
Spoofer.zip
-
Size
76.5MB
-
MD5
758fcab78b3ebaef35e19967c4257065
-
SHA1
f69baf42f3cc916e51779a1299e6ac831db327a1
-
SHA256
9644e499266c4a5f046b661effc63c95cdf161ba31b481c40d6fb012733ef680
-
SHA512
f911e8b096fd7ffe55e553b6510ed68d1a99313b45aadb6c0f71fc65eda40fa309e61a20c279349c57f8e888b94138a7d9b71b5e451f32f719e184072c33b248
-
SSDEEP
1572864:3AcmPPZdNCtAlavcmpggH9JNjaQXJX2GlY2mZq0rvLXhJXX3701iFQ0YtN1Co:3AxPAWla8wzdX/ljiqIzoCcn
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2124 7zFM.exe Token: 35 2124 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 7zFM.exe