General
-
Target
DiscordX (1).exe
-
Size
16.1MB
-
Sample
230331-vqc2bsbh75
-
MD5
d0785637450d87cf3563437464bc3588
-
SHA1
ea6937d09ebab4169a078285145e30c51f259760
-
SHA256
5bb4e7705ce47a92636958131e17b1fc015dc842f755a318ebccc4dddef5c98a
-
SHA512
fcfa7625473a496241fe17e35c81d31c5f7dcc16d21efd42bd6a82f15243188310e77f074448214abbc2b0f000b81bd24fd4311d2c01727465828583e4bafa92
-
SSDEEP
393216:P76K570vRedd4q7tKi9js1PRg9XvOrlVXtLojNJ:eKpdiqRKixs1PmlGlVm5J
Static task
static1
Malware Config
Targets
-
-
Target
DiscordX (1).exe
-
Size
16.1MB
-
MD5
d0785637450d87cf3563437464bc3588
-
SHA1
ea6937d09ebab4169a078285145e30c51f259760
-
SHA256
5bb4e7705ce47a92636958131e17b1fc015dc842f755a318ebccc4dddef5c98a
-
SHA512
fcfa7625473a496241fe17e35c81d31c5f7dcc16d21efd42bd6a82f15243188310e77f074448214abbc2b0f000b81bd24fd4311d2c01727465828583e4bafa92
-
SSDEEP
393216:P76K570vRedd4q7tKi9js1PRg9XvOrlVXtLojNJ:eKpdiqRKixs1PmlGlVm5J
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-