Behavioral task
behavioral1
Sample
Nezur_cracked_by_pysen.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
Nezur_cracked_by_pysen.exe
Resource
win11-20240221-en
General
-
Target
Nezur_cracked_by_pysen.exe
-
Size
78KB
-
MD5
7ab01d8727291679670263c2f1b128a1
-
SHA1
c98cd2a01bcb28164c066365eeca106f046ae26d
-
SHA256
890728f63ce1c4875b1404954c9e41f2dd43e5b29d37905325e770c0d20c1dcf
-
SHA512
6b4edf87f22855ef3ebd68353633a82747c7a730a3d2b113774055c144013797b2e4a1ab6bb19211b060b7b19771eec369e69326b3fcde19ab691c935958f9be
-
SSDEEP
1536:q2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+rPId:qZv5PDwbjNrmAE+DId
Malware Config
Extracted
discordrat
-
discord_token
MTIxMDAxMDUyMDc3MDU4MDUwMA.GkuSm6.X7nnB8gpGeBFbsnyKnNNzyFVTxUNi_qVUz7jzw
-
server_id
1197583538841735228
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Nezur_cracked_by_pysen.exe
Files
-
Nezur_cracked_by_pysen.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ