General
-
Target
source_prepared.exe
-
Size
81.8MB
-
Sample
250415-fcaxgsstet
-
MD5
e91b93446f017b6bbf37843739e14da2
-
SHA1
7a9d955e329ce9ce00c7e99765169f72c5089dd2
-
SHA256
5eb333dcb2e811847c14f33535fe3ae897a4bc64448fd1ae93be32e09f76b3a4
-
SHA512
83a95f7c532716b80ea548d90dba870429623447bb9ae7748a9e50be52c6c38e14bc533fced84cb7788132ee4b9f9748574b48525ba71e600bdc05eed0fa7e33
-
SSDEEP
1572864:xtIupuQ/rKUJlAGWGPdOkiqOv8im2A69E7EZlnGiYKrhbOoAkNZPq63HWWl:4Yd/BJRbVOknOv8i35HZlbrFo0Pb3HW
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20250410-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win10v2004-20250410-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
source_prepared.exe
-
Size
81.8MB
-
MD5
e91b93446f017b6bbf37843739e14da2
-
SHA1
7a9d955e329ce9ce00c7e99765169f72c5089dd2
-
SHA256
5eb333dcb2e811847c14f33535fe3ae897a4bc64448fd1ae93be32e09f76b3a4
-
SHA512
83a95f7c532716b80ea548d90dba870429623447bb9ae7748a9e50be52c6c38e14bc533fced84cb7788132ee4b9f9748574b48525ba71e600bdc05eed0fa7e33
-
SSDEEP
1572864:xtIupuQ/rKUJlAGWGPdOkiqOv8im2A69E7EZlnGiYKrhbOoAkNZPq63HWWl:4Yd/BJRbVOknOv8i35HZlbrFo0Pb3HW
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
discord_token_grabber.pyc
-
Size
8KB
-
MD5
05b1abcf2b8f1457cee0f078bdbb04f0
-
SHA1
ce070d54e1d54ffd6c4d96b616f21b7466a062c7
-
SHA256
2e82faaefa817254cf2a9d5149e3c36c04c3e09aca0bcc1a4e4fa894e137c1b1
-
SHA512
5af2746296f191af559639b1c5463993e8c4fb25ef945677142a6a02486e6670669eb5a5bdd4c163f1bdd8bd35a7bb8998bbf32e4d0fe9d35db379cf80159a57
-
SSDEEP
192:iQR8Lslmujbwybyo5HptlYwqJFD7U6r18ZPuNz:vNmcwcpt+D7Ua18uz
Score3/10 -
-
-
Target
get_cookies.pyc
-
Size
5KB
-
MD5
ab0f8084441f8312bffc9d26193967ab
-
SHA1
82b9c1c9cd1f5a38ac2b415a96c88ce99d27455a
-
SHA256
6f67d11524ed42b8990be66aed829232514b364746fdceea30e0213204427be4
-
SHA512
1722dfe7200b5f8fef0cfc4188953621630c7ee8672586490b9309a40512eb7f99fc56ffe52f6a0970809a38e3bdd8ce1862ba6803fe6d09bdfacda1b3fe1732
-
SSDEEP
96:4Q0jzMv/ppR+xVBcnqhLchLPxrpTkBWeBDFZcj3KldyzoZ:sSZYXPhYhLP12zij3KnyA
Score3/10 -
-
-
Target
misc.pyc
-
Size
2KB
-
MD5
5bff7de9304595611b9deeea55076bd3
-
SHA1
ae5fd2f3fbac4b0587140ab41b30c4d3da286c75
-
SHA256
39c73d32dce8fe34f56ca6fce56ae54ca99456c49fa04c949a45ca7d8e7355d9
-
SHA512
4cb8277d8c02380679bcc19ec6cba2dae37b24058116e08cfec30f95a158c1c3b45590c79665ace9abbeda277f1f39be1e806fd90c8dae9a3c44cd69d1157679
Score3/10 -
-
-
Target
passwords_grabber.pyc
-
Size
4KB
-
MD5
dbd5603fbc95768a5f3f45e6e1f7f109
-
SHA1
b1fa1a73c1e9e0ee63cccf5a81210a8aa39bf40a
-
SHA256
657361e158e5b5d76cf2b615d58c7c34de2d06d40f1c049c0757019fadab5e13
-
SHA512
310aabd4b5ef007faaaac149ea5b182c20eb3db2ea576e1039fc86d8ed5bb7e63b437d10c2c876ab40a0f9f7782dbfc5804d02cf12a0d74d9b1fe5b1a9a035d5
-
SSDEEP
96:4APDnTWeYwD86gWxS6679kZOyfkoXyWQUUEXtH0lLCvpW1mhs0:FzCUD/S6UyRkpoUEKlLz1m+0
Score3/10 -
-
-
Target
source_prepared.pyc
-
Size
64KB
-
MD5
a70f7955649906b8ceadc0121d9397b4
-
SHA1
af687b4161db3861f2e7f3c0cb764062675e1e62
-
SHA256
2fe954c4c5819719c5aa98257e92978e79baa3d865cb44e2cc0455ac5cbc9fd6
-
SHA512
ae3732f64bd8b6b799a6d93cdf2c88fc18c26b4e2b7aa0006ca5e66f50ccf344568bc5ae9f3f8a1e5942e04d896e8d75deebb4648da85cad11a9d67b2c9a52ca
-
SSDEEP
1536:HmBEpSBVqhGjeCBdjxVFH3dBUoHFrICh/:L8XHNNVFDUoHtR
Score3/10 -
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1