General
-
Target
Discord Account Creator.exe
-
Size
16.0MB
-
Sample
230512-xbjxfaeb65
-
MD5
3c4579c082cbc74efae98871d20cc5a0
-
SHA1
1f7974c030d666cf61a912193852fce3ebf58dc5
-
SHA256
c3d408ccb170219bf52f1dedbc24f02595110b28bbc34adcba6c39ec3a027e00
-
SHA512
87b95959c0b859ab8624bfd7fd940cb7ab0f20bc47e102b32a51ca247014cb7369a8897f327f7ba4c6b2a8dee691833eb9dca2242a967277d2c291d1f0a3f046
-
SSDEEP
393216:2hbGgP1KwCteW6EW3imtykJQlpYKoV3UWTj4iD8h:2hbn1Ate3rEU0ToV3nj
Behavioral task
behavioral1
Sample
Discord Account Creator.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
Discord Account Creator.exe
-
Size
16.0MB
-
MD5
3c4579c082cbc74efae98871d20cc5a0
-
SHA1
1f7974c030d666cf61a912193852fce3ebf58dc5
-
SHA256
c3d408ccb170219bf52f1dedbc24f02595110b28bbc34adcba6c39ec3a027e00
-
SHA512
87b95959c0b859ab8624bfd7fd940cb7ab0f20bc47e102b32a51ca247014cb7369a8897f327f7ba4c6b2a8dee691833eb9dca2242a967277d2c291d1f0a3f046
-
SSDEEP
393216:2hbGgP1KwCteW6EW3imtykJQlpYKoV3UWTj4iD8h:2hbn1Ate3rEU0ToV3nj
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-