General
-
Target
https://cdn.discordapp.com/attachments/1173019119185043456/1215250081188683826/main.exe?ex=65fc10d5&is=65e99bd5&hm=037c9bb651ff5978675947bc0d43bfe40ced9ee155db73e5a9e60c0e5207f27f&
-
Sample
240310-qwfbesdf53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1173019119185043456/1215250081188683826/main.exe?ex=65fc10d5&is=65e99bd5&hm=037c9bb651ff5978675947bc0d43bfe40ced9ee155db73e5a9e60c0e5207f27f&
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1173019119185043456/1215250081188683826/main.exe?ex=65fc10d5&is=65e99bd5&hm=037c9bb651ff5978675947bc0d43bfe40ced9ee155db73e5a9e60c0e5207f27f&
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-