General

  • Target

    yomograbber.exe

  • Size

    80.6MB

  • MD5

    5d2d54141fc7d7ff6b8af8b9b68a7f77

  • SHA1

    5bd91851bb2bcdda7aea6ef7d826c24a31c71e54

  • SHA256

    0d2cc70018449c4a4eb0081f24d918a1231ebc956a03b51b7f6a4b54f3afd778

  • SHA512

    6d4a0cc06d8a87a629dd798628f5821113a792724b38f340f902781a26ebdf73de369cef727ff2cd3afd03e4edc37da350e55df6b68240d87d8770f634901089

  • SSDEEP

    1572864:tGKlgWjysmwSk8IpG7V+VPhqHJE7Bbli08iYgj+h58sMwnDBZB:MKi1smwSkB05awHSw025jt

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • yomograbber.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc