General

  • Target

    Boostrapper.exe

  • Size

    103.0MB

  • MD5

    6f33bedd125bc6ad6e88248129e0fc11

  • SHA1

    b3586fc9d03717307d92527f71ecdf706a96de05

  • SHA256

    10bcf998d8b57e71eafc5d946eedf7a359c8a7fead89efc3ffc54d491d7d7728

  • SHA512

    263b690ae2101724fa63e38fccb801d42fe167866618419a42e47fc5e60d8ee656b58e59bd8299142fea3efac09361baf91ac119fca28f91aeb8207fd0e8679c

  • SSDEEP

    3145728:33nzTCRrS6xjKcBanL2qHO5iVXfnGQbRe0zJcB3Z2:HzOZSWNaBHCid1XcBE

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Boostrapper.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc