Overview
overview
10Static
static
10source_prepared.exe
windows7-x64
7source_prepared.exe
windows10-2004-x64
7discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
8get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
8misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
8passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
8source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
8Resubmissions
16-02-2025 17:21
250216-vxb3lstpey 1016-02-2025 17:18
250216-vvj1fatpa1 1027-06-2024 13:41
240627-qzlbvaweqr 10Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-02-2025 17:21
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20250211-en
General
-
Target
source_prepared.exe
-
Size
78.1MB
-
MD5
33db3f11d58954ad2e622aa3cc8d3245
-
SHA1
a974e3955b9b58bef9747dfa34d8da960a69ef37
-
SHA256
bf285c1bc797434aa522968ec26c1338c6c7d1a672be168562baa57ec5d9eecb
-
SHA512
76581bedfccc31bf274f12b815d2822b52f6fb3f21154b8627fe45c28e914a12e772103b938e6b9717d8f2b0740610ef3295b228797dc444c54636686103a313
-
SSDEEP
1572864:SvFUQ6llSk8IpG7V+VPhqgtgWURtgWqcSylPjW2va9fkLSCHFSWsdZ7hJR0:SvFU1HSkB05awtWUwW2y5qQa9mS+SHnk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2708 source_prepared.exe -
resource yara_rule behavioral1/files/0x000400000001cdb7-1253.dat upx behavioral1/memory/2708-1255-0x000007FEF60A0000-0x000007FEF650E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2708 1884 source_prepared.exe 30 PID 1884 wrote to memory of 2708 1884 source_prepared.exe 30 PID 1884 wrote to memory of 2708 1884 source_prepared.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"2⤵
- Loads dropped DLL
PID:2708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5933b49da4d229294aad0c6a805ad2d71
SHA19828e3ce504151c2f933173ef810202d405510a4
SHA256ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206
SHA5126023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165