- Feb 25, 2017
- 2,584
Found another discord token stealer similar to the last one I posted a few days ago that is also only detected by one engine on VirusTotal. Would be interesting to see how multiple AVs react to this threat as it's barely detected by any engine.
Maybe @Shadowra @Trident @Jengo want to test it with CheckPoint, Deep Instinct etc.
Just if you find the time of course
Website with the stealer: https://kyrazon[.]com
Password to the archive is "KS2024"
VirusTotal: VirusTotal
Triage: c765f61cee33c326acc4ea19256267c35129a1ec7edb567fe0b5ed9a88e3d6b1 | Triage
AnyRun: Analysis KyrazonSetup.exe (MD5: 7A84BBEADE50E7110FE8D278DC22B92D) Malicious activity - Interactive analysis ANY.RUN
FileScan: Filescan.IO - Next-Gen Malware Analysis Platform
Hybrid Analysis: Free Automated Malware Analysis Service - powered by Falcon Sandbox
Maybe @Shadowra @Trident @Jengo want to test it with CheckPoint, Deep Instinct etc.
Just if you find the time of course
Website with the stealer: https://kyrazon[.]com
Password to the archive is "KS2024"
VirusTotal: VirusTotal
Triage: c765f61cee33c326acc4ea19256267c35129a1ec7edb567fe0b5ed9a88e3d6b1 | Triage
AnyRun: Analysis KyrazonSetup.exe (MD5: 7A84BBEADE50E7110FE8D278DC22B92D) Malicious activity - Interactive analysis ANY.RUN
FileScan: Filescan.IO - Next-Gen Malware Analysis Platform
Hybrid Analysis: Free Automated Malware Analysis Service - powered by Falcon Sandbox