Overview
overview
10Static
static
10Total AV.exe
windows10-2004-x64
7Total AV.exe
windows11-21h2-x64
7discord_to...er.pyc
windows10-2004-x64
3discord_to...er.pyc
windows11-21h2-x64
3get_cookies.pyc
windows10-2004-x64
3get_cookies.pyc
windows11-21h2-x64
3misc.pyc
windows10-2004-x64
3misc.pyc
windows11-21h2-x64
3passwords_grabber.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows11-21h2-x64
3protections.pyc
windows10-2004-x64
3protections.pyc
windows11-21h2-x64
3source_prepared.pyc
windows10-2004-x64
3source_prepared.pyc
windows11-21h2-x64
3Analysis
-
max time kernel
555s -
max time network
442s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 20:40
Behavioral task
behavioral1
Sample
Total AV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Total AV.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
protections.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
protections.pyc
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
source_prepared.pyc
Resource
win11-20241007-en
General
-
Target
source_prepared.pyc
-
Size
229KB
-
MD5
bf91fae81947f2cdff0c3685679b330a
-
SHA1
7ef2002a4946ed0a88b22e47bd0d6cb93ff75d54
-
SHA256
533d5f7cbceefe280ea19f98eb55571bb5b180844d17d7ba112695d7d8243277
-
SHA512
e3b11caeca2455f5a778c6c77c58fc114bfdd15bebca08d4903084286b9b500e83ea0693dd8bc28b4ddd15937151aacf98951dad4e951e54e8f67677473e406f
-
SSDEEP
3072:JrGdZqFjQqi6Xq3D6+od8btkt/qA8HiMN8YpVs7YB:JrUZCi6am+o7tF0Pe6sg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1936 OpenWith.exe