General

  • Target

    FortniteSpoofer.exe

  • Size

    60.9MB

  • MD5

    af4d618c235ce2459d7e2d0fc79119b7

  • SHA1

    6644430c1276f7043869d834ae8c3b58c6cc6808

  • SHA256

    e5056d3c0b8374c07356a09194dde6bbf490bfdf31d094926473760b6da0ec39

  • SHA512

    edbdfbcad2b88a08bc79a598eac3a53060d3309c79944de80071a1f505540f1e29ecad361697a09488147e24d972dc6b95a6bcade631bd6759e1d4134eb38f33

  • SSDEEP

    1572864:xriI42qHWB75il/Z2CbuDzm5i/6afQtAhD40pXHM02OGOlHOOKnwJ:V42qHO5ilwnG0iWMstB2O1

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • FortniteSpoofer.exe
    .exe windows:6 windows x64 arch:x64

    Password: Mhm

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc