General

  • Target

    SPOILER_SPOILER_SPOILER_Discord_Nitro_Generator.exe

  • Size

    10.3MB

  • Sample

    240219-t7dhragd4x

  • MD5

    deb8e6b240f3fe4f14717f270bc7d72b

  • SHA1

    454d0cc939a7c45fcd38f2a10a6fe025d8c2a1ba

  • SHA256

    f16a87e183bfe34afc75098a027d9397bf97a8fd2d289abe723d628072602b3c

  • SHA512

    cd3da01d3305e722cec703e4e7a5581ca1e73a6f8a6133ed0fb8e4a2a8c619dd719ce390f8fce142b1a06171f9576d679c80b19b099e306d2ea2a69a9aee6b83

  • SSDEEP

    196608:SDf+GIzme9onJ5hrZERlyiU8AdZYJERS48RmU/3ZlsPvarTsZg8CNhHSzCqblZou:JPzJ9c5hlERJAdZYygtN3ZWarQcHSl6

Score
7/10

Malware Config

Targets

    • Target

      SPOILER_SPOILER_SPOILER_Discord_Nitro_Generator.exe

    • Size

      10.3MB

    • MD5

      deb8e6b240f3fe4f14717f270bc7d72b

    • SHA1

      454d0cc939a7c45fcd38f2a10a6fe025d8c2a1ba

    • SHA256

      f16a87e183bfe34afc75098a027d9397bf97a8fd2d289abe723d628072602b3c

    • SHA512

      cd3da01d3305e722cec703e4e7a5581ca1e73a6f8a6133ed0fb8e4a2a8c619dd719ce390f8fce142b1a06171f9576d679c80b19b099e306d2ea2a69a9aee6b83

    • SSDEEP

      196608:SDf+GIzme9onJ5hrZERlyiU8AdZYJERS48RmU/3ZlsPvarTsZg8CNhHSzCqblZou:JPzJ9c5hlERJAdZYygtN3ZWarQcHSl6

    Score
    7/10
    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      file.pyc

    • Size

      3KB

    • MD5

      62e23b0f1c741bf8fb513b41dde8d899

    • SHA1

      c31dc4b94da0cb85470eaaf14e3ccf4b4626a975

    • SHA256

      65f01b4494b698ad3eb3aac70747df7027451b3d64c39f19a7d982147dcbf4ca

    • SHA512

      81470248f0bc91267a9f2169d8adf420b5d1e10f7c2acea4788fed642d661b873c91f12da31ff47d7621173a4b5bc11285c51a5fcbbf9edc2caee0ec6c70af6f

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks