General

  • Target

    DiscordX (1).exe

  • Size

    16.1MB

  • Sample

    230331-vqc2bsbh75

  • MD5

    d0785637450d87cf3563437464bc3588

  • SHA1

    ea6937d09ebab4169a078285145e30c51f259760

  • SHA256

    5bb4e7705ce47a92636958131e17b1fc015dc842f755a318ebccc4dddef5c98a

  • SHA512

    fcfa7625473a496241fe17e35c81d31c5f7dcc16d21efd42bd6a82f15243188310e77f074448214abbc2b0f000b81bd24fd4311d2c01727465828583e4bafa92

  • SSDEEP

    393216:P76K570vRedd4q7tKi9js1PRg9XvOrlVXtLojNJ:eKpdiqRKixs1PmlGlVm5J

Score
7/10

Malware Config

Targets

    • Target

      DiscordX (1).exe

    • Size

      16.1MB

    • MD5

      d0785637450d87cf3563437464bc3588

    • SHA1

      ea6937d09ebab4169a078285145e30c51f259760

    • SHA256

      5bb4e7705ce47a92636958131e17b1fc015dc842f755a318ebccc4dddef5c98a

    • SHA512

      fcfa7625473a496241fe17e35c81d31c5f7dcc16d21efd42bd6a82f15243188310e77f074448214abbc2b0f000b81bd24fd4311d2c01727465828583e4bafa92

    • SSDEEP

      393216:P76K570vRedd4q7tKi9js1PRg9XvOrlVXtLojNJ:eKpdiqRKixs1PmlGlVm5J

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks