Overview
overview
10Static
static
10AutoDiscorder.zip
windows7-x64
7AutoDiscorder.zip
windows10-2004-x64
1AutoDiscorder.exe
windows7-x64
7AutoDiscorder.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3PW IS 123.txt
windows7-x64
1PW IS 123.txt
windows10-2004-x64
1Readme.txt
windows7-x64
1Readme.txt
windows10-2004-x64
1Troubleshooting.txt
windows7-x64
1Troubleshooting.txt
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 18:17
Behavioral task
behavioral1
Sample
AutoDiscorder.zip
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
AutoDiscorder.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AutoDiscorder.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
AutoDiscorder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
get_cookies.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
misc.pyc
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
passwords_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
source_prepared.pyc
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
PW IS 123.txt
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PW IS 123.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Readme.txt
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Readme.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Troubleshooting.txt
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Troubleshooting.txt
Resource
win10v2004-20241007-en
General
-
Target
source_prepared.pyc
-
Size
185KB
-
MD5
63b89dc7a0bd32ef8d29341ecdb0096f
-
SHA1
333040a6356d6d2ab5371771aa8791625d7d27f2
-
SHA256
55fbeb65e713912c3d4d175c0cbce19bc1f2ee71f6c46cc927ca601f87937d77
-
SHA512
f824cc3288bd720d0e9341296f3a5a47ab76870ba6a287bf78a753a625a8966c5e7e2d23cec67bd96b9483bb299891291946ca781ca1a8c2000a2a6f16064b67
-
SSDEEP
3072:sTQILaG+yA9MQTxhoMPEtelZN+tVZaPjCgsQ/6Ckne:sTvWG+zNhoM8cN+7ZaPjCgsQyCX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 1196 OpenWith.exe