General
-
Target
celex.exe
-
Size
6.6MB
-
Sample
240226-2b258sac81
-
MD5
1aabc9a82b078abd11a36f6bf734a905
-
SHA1
77c6ea875901bfb7dec842e12653f35174b56f21
-
SHA256
eb136670a24ac3d3f43680b844c95d6b7fa35102f42ad07e39cd93f6b68b8100
-
SHA512
377df0ab35943bf5694c5e06204704ea26ac41842a3752fb2d0a3497b12a68938b3bf1aa877016e5ddf98138950256ccc0a7f135b21937d1943f0d6f0f7f9bbb
-
SSDEEP
196608:ufZBJDOYjJlpZstQoS9Hf12VKXMSELFexb2d:GBpGt7G/MyyFeEd
Behavioral task
behavioral1
Sample
celex.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
celex.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
���.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
���.pyc
Resource
win10v2004-20240226-en
Malware Config
Extracted
discordrat
-
discord_token
MTIxMTQxNjgxMzUyNzc2NTAwMw.GDkq7R.O8XX6ytVrJ_HArSHt0Bya-oJk0Qqej2-l4UJUo
-
server_id
1211416944469737502
Targets
-
-
Target
celex.exe
-
Size
6.6MB
-
MD5
1aabc9a82b078abd11a36f6bf734a905
-
SHA1
77c6ea875901bfb7dec842e12653f35174b56f21
-
SHA256
eb136670a24ac3d3f43680b844c95d6b7fa35102f42ad07e39cd93f6b68b8100
-
SHA512
377df0ab35943bf5694c5e06204704ea26ac41842a3752fb2d0a3497b12a68938b3bf1aa877016e5ddf98138950256ccc0a7f135b21937d1943f0d6f0f7f9bbb
-
SSDEEP
196608:ufZBJDOYjJlpZstQoS9Hf12VKXMSELFexb2d:GBpGt7G/MyyFeEd
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
���.pyc
-
Size
857B
-
MD5
3215d585f57e1f08cbb537f8a83533e5
-
SHA1
1ac27a89e3a45a500061dbba274a8c28a598be30
-
SHA256
31aa2c08707b455a43c17c20859a6c2dcf5581b6aa502ca180f38b151f9552e5
-
SHA512
fa6ba123226f7530c0395c047eacf79bdca3f9575a55ad0ab6d82f7b87beebbda14d2833901784f6921625c2c28e5553d4f1f732e0a6373a6d11db9061cc3674
Score1/10 -