General

  • Target

    spoofer.exe

  • Size

    80.7MB

  • MD5

    b915bef7cffd48dfd485d2a85791de47

  • SHA1

    1c67c73373e9cefc579db0d469142e1d517f06d6

  • SHA256

    ffbf1d7b55600e6c916539794670b7ba8bc4adfc2ecaaf969cda0835138919a1

  • SHA512

    a558c32a566e919e4dec4c4e1f654449d2cfbdba2cea9529bfa7549a693fd5a816689db20437daea3efd0e7b3e537eca72c5adb210df592f4f437cf67c867d7d

  • SSDEEP

    1572864:QPJlLWLN0RSk8IpG7V+VPhq9AE7DliriYgj+h58sMwierSipjcJ5j:EJNfSkB05aw9Zwl5eerTgj

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc