General
-
Target
MainMenu.rbxm
-
Size
14KB
-
Sample
240415-wj2xjsce98
-
MD5
570b9b9cd36ee573826296c9c1e24dea
-
SHA1
69bb3c2b05b2043b53fa2fa25f3c227d3b3c7bbc
-
SHA256
398c45daf283a0bb0a57696cac3c2f67fff96d5ea5f0f53a6f1dd7a693a0e22a
-
SHA512
6d59a8fed062a7a95ddeab579e21f2eda37c9c9a635be657bd1122fb57498f20a18deb9fa3434c4d9dad62bf85a1a9a1751e5e21a7a0403863039edd51a39a82
-
SSDEEP
192:WkV5Yqitq3KfkjaGRCNkjWKARcZizO9Bpy/nw8vJemQQJ:pDaiLRCJKocZiy9Py/nLvJeyJ
Static task
static1
Behavioral task
behavioral1
Sample
MainMenu.rbxm
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
MainMenu.rbxm
Resource
win11-20240412-en
Malware Config
Extracted
discordrat
-
discord_token
MTIyMjY1ODg0NzM1NzkyNzQzNQ.G46owp.2JEzFsoF0sNveJ3Ig7Q_yTdVD59ktO7ZBNMdzw
-
server_id
1211370597838487562
Targets
-
-
Target
MainMenu.rbxm
-
Size
14KB
-
MD5
570b9b9cd36ee573826296c9c1e24dea
-
SHA1
69bb3c2b05b2043b53fa2fa25f3c227d3b3c7bbc
-
SHA256
398c45daf283a0bb0a57696cac3c2f67fff96d5ea5f0f53a6f1dd7a693a0e22a
-
SHA512
6d59a8fed062a7a95ddeab579e21f2eda37c9c9a635be657bd1122fb57498f20a18deb9fa3434c4d9dad62bf85a1a9a1751e5e21a7a0403863039edd51a39a82
-
SSDEEP
192:WkV5Yqitq3KfkjaGRCNkjWKARcZizO9Bpy/nw8vJemQQJ:pDaiLRCJKocZiy9Py/nLvJeyJ
Score10/10-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-