General
-
Target
execut0r.exe
-
Size
8.8MB
-
Sample
240304-wzpl6aad63
-
MD5
9b6717d0b11c5dbff515dded2d5eec8b
-
SHA1
9812786de0e8d6ab2a8802b35753b4d29bbdaaaa
-
SHA256
fd87009643f3b6cfa5f335c2a1d2c4d1dc0ca6106a4d7f75734eada3b95f3d76
-
SHA512
1a0160930baf2d900dbf39d48def7af6966c9dc16906d472697e2c168b6b6712699513dc0e8a2c2119486b8f5ff83edfc0bf0d5ab0cd6222c0e3a7c502184883
-
SSDEEP
196608:3V5xiBq1qBIsqgHi+YI5bcZc8QXEM3SuZHUWaTpC:F5Mk1quz+YIiZcN3Su5UxpC
Static task
static1
Behavioral task
behavioral1
Sample
execut0r.exe
Resource
win11-20240221-en
Malware Config
Extracted
discordrat
-
discord_token
MTE5NzYwOTgxMzYwMTk1OTk4Ng.GgsKXB.EHNlZThtGnz_SHhuJyaCkxAQVdMHBW1S3Y1PI0
-
server_id
1197608956537872415
Targets
-
-
Target
execut0r.exe
-
Size
8.8MB
-
MD5
9b6717d0b11c5dbff515dded2d5eec8b
-
SHA1
9812786de0e8d6ab2a8802b35753b4d29bbdaaaa
-
SHA256
fd87009643f3b6cfa5f335c2a1d2c4d1dc0ca6106a4d7f75734eada3b95f3d76
-
SHA512
1a0160930baf2d900dbf39d48def7af6966c9dc16906d472697e2c168b6b6712699513dc0e8a2c2119486b8f5ff83edfc0bf0d5ab0cd6222c0e3a7c502184883
-
SSDEEP
196608:3V5xiBq1qBIsqgHi+YI5bcZc8QXEM3SuZHUWaTpC:F5Mk1quz+YIiZcN3Su5UxpC
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-