General
-
Target
Discord nitro generator.exe
-
Size
34.0MB
-
Sample
230202-b8d7kaeb88
-
MD5
b9333978f0a35d14b4bd146da66afc58
-
SHA1
bd76cf9c594145bdce269073e32b33a20854110f
-
SHA256
cd9bbc61e70de80264b508d8b3c2a4e42ee852398da6768b3f73e3ce581a3228
-
SHA512
c16ff35662f208d3d8e9e4f543273491474e3e760aa53100ca875742b49c9f7c1058a302a4c9da0cca77656426cb203acca6ef653472767d3b48eaf402e42879
-
SSDEEP
786432:1zx3Fmzux4vdQuvUUJad7cw0XDJ+OmqfaBQKoL77MJuxv4rzL19s35ocW/pU:jp4v/UnUd+9qCA3MAxvmsJ3W/y
Behavioral task
behavioral1
Sample
Discord nitro generator.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
Discord nitro generator.exe
-
Size
34.0MB
-
MD5
b9333978f0a35d14b4bd146da66afc58
-
SHA1
bd76cf9c594145bdce269073e32b33a20854110f
-
SHA256
cd9bbc61e70de80264b508d8b3c2a4e42ee852398da6768b3f73e3ce581a3228
-
SHA512
c16ff35662f208d3d8e9e4f543273491474e3e760aa53100ca875742b49c9f7c1058a302a4c9da0cca77656426cb203acca6ef653472767d3b48eaf402e42879
-
SSDEEP
786432:1zx3Fmzux4vdQuvUUJad7cw0XDJ+OmqfaBQKoL77MJuxv4rzL19s35ocW/pU:jp4v/UnUd+9qCA3MAxvmsJ3W/y
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-