General

  • Target

    Celestrial-Paid-Leak.exe

  • Size

    75.5MB

  • MD5

    f039213abab7640ff26bcc39ede11aa9

  • SHA1

    50f929bd448dbe97255206ee6bb2031c2bf6a27b

  • SHA256

    72f3a785dac566d8284f4cd4356e9a83448bdfcbd2f66fa627c9ce52d1506a16

  • SHA512

    b81dae108fd5821765dce5de86c78db0695a51c57b332013a58b52cf2352c4581306749e95a94535866a48af8585b496d369624ecc30c0817620816f38b227c8

  • SSDEEP

    1572864:YvFUQ6lnSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDaSWQ1Z4w0g:YvFU1lSkB05awIxTy5nMHVLteSD10g

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Celestrial-Paid-Leak.exe
    .exe windows:5 windows x64 arch:x64

    Password: sigma

    2ac23c52e7647c5bbea38e98bb68c652


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc