General
-
Target
Discord.exe
-
Size
18.8MB
-
Sample
230205-c4brbabc3v
-
MD5
6e1c740de994ac538bb8066e513f2b56
-
SHA1
8bb035046eac76a7c43cd252b47805b0b1d6a692
-
SHA256
2c8c3f71a3a477e39e30ac33ba5deb3a37c862f741f4357b2a31384f4ec383d1
-
SHA512
41306df12587b22b0dc22599205fe36eb202ca3f085d6418574ab00d073f1f75996370691f728a9efcdc3dfe591c527f95757ce15064ce556d64ed27665246c1
-
SSDEEP
393216:Uyu7L/quznSyY+k4tO2dQuslN/m3pDl9AJ4ZoWOv+9fPV4aNKmKLMjK7i:UyCLSOY4tndQu4KRS4ZorvS3nKmoMjKu
Behavioral task
behavioral1
Sample
Discord.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
Discord.exe
-
Size
18.8MB
-
MD5
6e1c740de994ac538bb8066e513f2b56
-
SHA1
8bb035046eac76a7c43cd252b47805b0b1d6a692
-
SHA256
2c8c3f71a3a477e39e30ac33ba5deb3a37c862f741f4357b2a31384f4ec383d1
-
SHA512
41306df12587b22b0dc22599205fe36eb202ca3f085d6418574ab00d073f1f75996370691f728a9efcdc3dfe591c527f95757ce15064ce556d64ed27665246c1
-
SSDEEP
393216:Uyu7L/quznSyY+k4tO2dQuslN/m3pDl9AJ4ZoWOv+9fPV4aNKmKLMjK7i:UyCLSOY4tndQu4KRS4ZorvS3nKmoMjKu
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-