Analysis

  • max time kernel
    91s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    31-12-2024 13:07

General

  • Target

    discord_token_grabber.pyc

  • Size

    8KB

  • MD5

    e65aa3a3452d4cc97930c3af058f1c10

  • SHA1

    81065dc50886648e1895b4d4dda99fc21e2b28c2

  • SHA256

    2468bc7f83adbcfd3c2fd86c3340ccc6f98aeec288f318494d1607907ffcd468

  • SHA512

    0a45d12010203c5a5b33fae57892b7a812e1e0c7fbefbeb08bc1d7ad2e5bbf4cb4f8761bda29fc695808c30ec0569b7f5f039c2ea5a261108eb7ed7f2f71494f

  • SSDEEP

    192:iQR8LslmujbQybyo5HptlYwqJFD7U6r18ZPuNz:vNmcQcpt+D7Ua18uz

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc
    1⤵
    • Modifies registry class
    PID:692
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads