General

  • Target

    source_prepared.exe

  • Size

    81.5MB

  • Sample

    250119-le9rgssmay

  • MD5

    11a788a140573f253a82cfe84486e5aa

  • SHA1

    ca80525b14d7186c19ae8731393778203f54d6cc

  • SHA256

    20d351ae39807bba7ca2520efb9aa1230978747cc956e6c5f6374f9d67d3536e

  • SHA512

    40702a0125eff54a7e28f8168b1a69ace689ce25eb26045145a54b89d9ed12158c9679859fa4708afe487c10af098259eafe4c0d6d0cd329ca0be1846cb3eb4d

  • SSDEEP

    1572864:+n21lIO07OkiqOv8im2AQsE7SHln1AiYKrhbOoAkAongvguFKWmF:+MW1OknOv8i3XUHlDrFoEngvtFKW

Score
10/10

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      81.5MB

    • MD5

      11a788a140573f253a82cfe84486e5aa

    • SHA1

      ca80525b14d7186c19ae8731393778203f54d6cc

    • SHA256

      20d351ae39807bba7ca2520efb9aa1230978747cc956e6c5f6374f9d67d3536e

    • SHA512

      40702a0125eff54a7e28f8168b1a69ace689ce25eb26045145a54b89d9ed12158c9679859fa4708afe487c10af098259eafe4c0d6d0cd329ca0be1846cb3eb4d

    • SSDEEP

      1572864:+n21lIO07OkiqOv8im2AQsE7SHln1AiYKrhbOoAkAongvguFKWmF:+MW1OknOv8i3XUHlDrFoEngvtFKW

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      discord_token_grabber.pyc

    • Size

      8KB

    • MD5

      e65aa3a3452d4cc97930c3af058f1c10

    • SHA1

      81065dc50886648e1895b4d4dda99fc21e2b28c2

    • SHA256

      2468bc7f83adbcfd3c2fd86c3340ccc6f98aeec288f318494d1607907ffcd468

    • SHA512

      0a45d12010203c5a5b33fae57892b7a812e1e0c7fbefbeb08bc1d7ad2e5bbf4cb4f8761bda29fc695808c30ec0569b7f5f039c2ea5a261108eb7ed7f2f71494f

    • SSDEEP

      192:iQR8LslmujbQybyo5HptlYwqJFD7U6r18ZPuNz:vNmcQcpt+D7Ua18uz

    Score
    3/10
    • Target

      get_cookies.pyc

    • Size

      5KB

    • MD5

      ab0f8084441f8312bffc9d26193967ab

    • SHA1

      82b9c1c9cd1f5a38ac2b415a96c88ce99d27455a

    • SHA256

      6f67d11524ed42b8990be66aed829232514b364746fdceea30e0213204427be4

    • SHA512

      1722dfe7200b5f8fef0cfc4188953621630c7ee8672586490b9309a40512eb7f99fc56ffe52f6a0970809a38e3bdd8ce1862ba6803fe6d09bdfacda1b3fe1732

    • SSDEEP

      96:4Q0jzMv/ppR+xVBcnqhLchLPxrpTkBWeBDFZcj3KldyzoZ:sSZYXPhYhLP12zij3KnyA

    Score
    3/10
    • Target

      misc.pyc

    • Size

      2KB

    • MD5

      5bff7de9304595611b9deeea55076bd3

    • SHA1

      ae5fd2f3fbac4b0587140ab41b30c4d3da286c75

    • SHA256

      39c73d32dce8fe34f56ca6fce56ae54ca99456c49fa04c949a45ca7d8e7355d9

    • SHA512

      4cb8277d8c02380679bcc19ec6cba2dae37b24058116e08cfec30f95a158c1c3b45590c79665ace9abbeda277f1f39be1e806fd90c8dae9a3c44cd69d1157679

    Score
    3/10
    • Target

      passwords_grabber.pyc

    • Size

      4KB

    • MD5

      dbd5603fbc95768a5f3f45e6e1f7f109

    • SHA1

      b1fa1a73c1e9e0ee63cccf5a81210a8aa39bf40a

    • SHA256

      657361e158e5b5d76cf2b615d58c7c34de2d06d40f1c049c0757019fadab5e13

    • SHA512

      310aabd4b5ef007faaaac149ea5b182c20eb3db2ea576e1039fc86d8ed5bb7e63b437d10c2c876ab40a0f9f7782dbfc5804d02cf12a0d74d9b1fe5b1a9a035d5

    • SSDEEP

      96:4APDnTWeYwD86gWxS6679kZOyfkoXyWQUUEXtH0lLCvpW1mhs0:FzCUD/S6UyRkpoUEKlLz1m+0

    Score
    3/10
    • Target

      source_prepared.pyc

    • Size

      64KB

    • MD5

      eafc1a15740eabbff7396bbc4cde1d98

    • SHA1

      786a27378ae194ec07bafa2121fd7efb54b97a64

    • SHA256

      cbc3cbd8af519460a189847184e33b388b6e1079f371676c0e3222699b033fd6

    • SHA512

      4ea239658e8e7237c17f01698a0f78643d751cd3bce73f1adf25bdc7365b9fe698e79af7318b35d7344994911fb11031a5add30d8828ccca8e918fd15868ff51

    • SSDEEP

      768:FOwV+obVSwxUgmLkx7YbJCjeAppQ6BdjxCV9PSd5zk4Q5VdB5ozK6VX+Ei40:FOypSomQxtjeCBdjx8O1kdB5oe6VXS40

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks