General

  • Target

    https://cdn.discordapp.com/attachments/1173019119185043456/1215250081188683826/main.exe?ex=65fc10d5&is=65e99bd5&hm=037c9bb651ff5978675947bc0d43bfe40ced9ee155db73e5a9e60c0e5207f27f&

  • Sample

    240310-qwfbesdf53

Score
8/10

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1173019119185043456/1215250081188683826/main.exe?ex=65fc10d5&is=65e99bd5&hm=037c9bb651ff5978675947bc0d43bfe40ced9ee155db73e5a9e60c0e5207f27f&

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks