General

  • Target

    DiscordSetup.exe

  • Size

    79.4MB

  • Sample

    221230-s263fabb41

  • MD5

    dbfdcb36fd2fe762eb471d52d22774bd

  • SHA1

    a6a3f2affeb5acdc132f080977f3fdfd0dd98140

  • SHA256

    7d5c479d6c4c89e8f535010e7fe8e71e02ca015045eee5ecb08b98fd18f29592

  • SHA512

    a14017ede345d63d3fb1a2e2cb5962d884ddecbbecc86239a22615e7aeaf1e17263e8767c1ce6f3a65d12c3da5ddcefb9b59ea6adb60e4274447e8e2dd4cb749

  • SSDEEP

    1572864:CzwNtRb4LJ+kmQnoigwNweKQKpIpOsoh+VrdJ2oD3LOPmQloeGsq:CzCQJ+8gyw3Thh6xJ2yTQSedq

Malware Config

Targets

    • Target

      DiscordSetup.exe

    • Size

      79.4MB

    • MD5

      dbfdcb36fd2fe762eb471d52d22774bd

    • SHA1

      a6a3f2affeb5acdc132f080977f3fdfd0dd98140

    • SHA256

      7d5c479d6c4c89e8f535010e7fe8e71e02ca015045eee5ecb08b98fd18f29592

    • SHA512

      a14017ede345d63d3fb1a2e2cb5962d884ddecbbecc86239a22615e7aeaf1e17263e8767c1ce6f3a65d12c3da5ddcefb9b59ea6adb60e4274447e8e2dd4cb749

    • SSDEEP

      1572864:CzwNtRb4LJ+kmQnoigwNweKQKpIpOsoh+VrdJ2oD3LOPmQloeGsq:CzCQJ+8gyw3Thh6xJ2yTQSedq

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks