General
-
Target
Discord Nitro Generator.exe
-
Size
19.2MB
-
Sample
230718-stchvscd5x
-
MD5
fd56abce78f5b7af0923901a0c6389dd
-
SHA1
30d5d2f6e3ba6af12654de98bac571d2c3e0de4f
-
SHA256
ab60e97887d847df3174281b4b231e0c6b891e7ac0c4eed2c305b45398530bff
-
SHA512
afa267883649c494e267d14b22346a898f0497de192163bd2c264e719da570157c24b99386d7216e991a690ffd98f78479854051adf505f04bc0dd2c3de2f1a3
-
SSDEEP
393216:gIoVRjW9dM/ISWdQ2lN/m3pJ+9J8ecH4+Z4Jt8hXeSs:gIoHjWT6ISWdQGKA9J8ecYwP
Behavioral task
behavioral1
Sample
Discord Nitro Generator.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
Discord Nitro Generator.exe
-
Size
19.2MB
-
MD5
fd56abce78f5b7af0923901a0c6389dd
-
SHA1
30d5d2f6e3ba6af12654de98bac571d2c3e0de4f
-
SHA256
ab60e97887d847df3174281b4b231e0c6b891e7ac0c4eed2c305b45398530bff
-
SHA512
afa267883649c494e267d14b22346a898f0497de192163bd2c264e719da570157c24b99386d7216e991a690ffd98f78479854051adf505f04bc0dd2c3de2f1a3
-
SSDEEP
393216:gIoVRjW9dM/ISWdQ2lN/m3pJ+9J8ecH4+Z4Jt8hXeSs:gIoHjWT6ISWdQGKA9J8ecYwP
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-