General

  • Target

    cwel.exe

  • Size

    76.6MB

  • MD5

    af68905bc16868fab729dcee959cc0b1

  • SHA1

    26bbeb56c4c6f8e0b73c57eac00dc04123cf9cb7

  • SHA256

    49d49e515fe1b2d29deb4667622420aea2e4a3c2f04babae14cce0b7732f5f5b

  • SHA512

    17b7922eb3f60c27978f3cee16202ffe1ca29da351e53399b03b225d0afb9286c954d970ee4399b68ae8f220336783247d62978d69fd54664ab6e7360487cf6f

  • SSDEEP

    1572864:r1l7Wd5mUSk8IpG7V+VPhqFxE7glhWiYweyJulZUdg6zfqiuWd72:r1Z05mUSkB05awF1LLpuqiOZ2

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cwel.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc