General
-
Target
6245d00bf7e8051185c503868c85ff431cc9375aabd14c3205198e0495a5575c
-
Size
3.8MB
-
Sample
240229-k38cwscf24
-
MD5
e3c7d016e11a0ce681ea63dd1cfab442
-
SHA1
f6437d066c1232e328ca42e6735be0bf03e02f56
-
SHA256
6245d00bf7e8051185c503868c85ff431cc9375aabd14c3205198e0495a5575c
-
SHA512
c1ec1e6507eaa4321485cc4385d6b713ab2502e75786814fdcf8b4dec1cd3766cff7af64e405c34d356e1753c4afe6c2c04491a753346eab1dd70dd119878c7f
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/SmlwXVZ4FB:5+R/eZADUXR
Behavioral task
behavioral1
Sample
6245d00bf7e8051185c503868c85ff431cc9375aabd14c3205198e0495a5575c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6245d00bf7e8051185c503868c85ff431cc9375aabd14c3205198e0495a5575c.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
bitrat
1.38
serverclient.sytes.net:44200
-
communication_password
202cb962ac59075b964b07152d234b70
-
install_dir
discord
-
install_file
svchost.exe
-
tor_process
tor
Targets
-
-
Target
6245d00bf7e8051185c503868c85ff431cc9375aabd14c3205198e0495a5575c
-
Size
3.8MB
-
MD5
e3c7d016e11a0ce681ea63dd1cfab442
-
SHA1
f6437d066c1232e328ca42e6735be0bf03e02f56
-
SHA256
6245d00bf7e8051185c503868c85ff431cc9375aabd14c3205198e0495a5575c
-
SHA512
c1ec1e6507eaa4321485cc4385d6b713ab2502e75786814fdcf8b4dec1cd3766cff7af64e405c34d356e1753c4afe6c2c04491a753346eab1dd70dd119878c7f
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/SmlwXVZ4FB:5+R/eZADUXR
Score10/10-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-