General

  • Target

    Discord.exe

  • Size

    18.8MB

  • Sample

    230205-c4brbabc3v

  • MD5

    6e1c740de994ac538bb8066e513f2b56

  • SHA1

    8bb035046eac76a7c43cd252b47805b0b1d6a692

  • SHA256

    2c8c3f71a3a477e39e30ac33ba5deb3a37c862f741f4357b2a31384f4ec383d1

  • SHA512

    41306df12587b22b0dc22599205fe36eb202ca3f085d6418574ab00d073f1f75996370691f728a9efcdc3dfe591c527f95757ce15064ce556d64ed27665246c1

  • SSDEEP

    393216:Uyu7L/quznSyY+k4tO2dQuslN/m3pDl9AJ4ZoWOv+9fPV4aNKmKLMjK7i:UyCLSOY4tndQu4KRS4ZorvS3nKmoMjKu

Malware Config

Targets

    • Target

      Discord.exe

    • Size

      18.8MB

    • MD5

      6e1c740de994ac538bb8066e513f2b56

    • SHA1

      8bb035046eac76a7c43cd252b47805b0b1d6a692

    • SHA256

      2c8c3f71a3a477e39e30ac33ba5deb3a37c862f741f4357b2a31384f4ec383d1

    • SHA512

      41306df12587b22b0dc22599205fe36eb202ca3f085d6418574ab00d073f1f75996370691f728a9efcdc3dfe591c527f95757ce15064ce556d64ed27665246c1

    • SSDEEP

      393216:Uyu7L/quznSyY+k4tO2dQuslN/m3pDl9AJ4ZoWOv+9fPV4aNKmKLMjK7i:UyCLSOY4tndQu4KRS4ZorvS3nKmoMjKu

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks