General
-
Target
nyxo aimlock.zip
-
Size
28KB
-
Sample
240328-vrp3aabd91
-
MD5
8c58dbab07c1d42249ff7f36da10ba57
-
SHA1
316abceeff9e1f4bc139c1d08bd63726a35c771e
-
SHA256
9a8bfdc495a216a9c4042522796043ffc7f4651153d369cf3fd3637ec35190e2
-
SHA512
1e1d8689d329a1801cc673e8f2f1a4fba7c7e77c1de8407e0eb95d147607bfed9f57e3341b9172c6275552b8ba666f66b70fb8521e3e58d499ebed0d95aed1e0
-
SSDEEP
768:L5lz6yZDgr9OtA8dozX0t6Id6Pv4wmcv5hGI:Ld2r6rcH9maB
Behavioral task
behavioral1
Sample
nyxo_aimlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
nyxo_aimlock.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
discordrat
-
discord_token
MTIyMjkzMTA2MzM4NzQ1NTUzOQ.GzvyiO.hWpvwSRqDF9zcO06McTFnTajKVkIy7Qs1p6kmw
-
server_id
1222930826723987619
Targets
-
-
Target
nyxo_aimlock.exe
-
Size
78KB
-
MD5
3e7ddc5f7fad580b7d36bd80714c343d
-
SHA1
f2943c1c5024da64c5e077e5a2c4139f661f3cce
-
SHA256
35afb2b65e7371130bd99515da2b695a009821c60d1006ea6bde3ee9532f842b
-
SHA512
e7e706ae8d1e892a5e2b542e23419c9c030fa654c06a8e955ea64a5fad0c5e1fa094332a36f24d978e02d812e428d2b91e97fe6f8a26a80f67dffbc5b1c360c0
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Score10/10-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-