General
-
Target
example.exe
-
Size
678KB
-
Sample
240417-n93mrsff9x
-
MD5
955a20bf9bbfc6a650f027d98de5dcde
-
SHA1
4e688a55950cb668f8e644230ef53f1854cfa960
-
SHA256
aec5fd78e242dbc6f94b87e479982b11c2d07f50b7008df3d735a45e765d9baa
-
SHA512
737e384f576080acf8c549c349301d3aef913235a02ca065d4a06425d21779da1a8f6a198d399e386977d4f7d92e7083a2ae46a16362782716541e460908a957
-
SSDEEP
12288:RD7/3BHTnGdBbrxr5kwvhnN9Lto9ghiJGZ/O:RD7/BHjGdBPxlfnN9LquhiuO
Static task
static1
Behavioral task
behavioral1
Sample
example.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
example.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
discordrat
-
discord_token
MTIwNzQ0Mjc2MTY3MDk4Nzg5Nw.G7QGsq.mV9vPnqHSKpUueDX1U0MR64-D5ZHLEHM-uK5fI
-
server_id
1228104284198015068
Targets
-
-
Target
example.exe
-
Size
678KB
-
MD5
955a20bf9bbfc6a650f027d98de5dcde
-
SHA1
4e688a55950cb668f8e644230ef53f1854cfa960
-
SHA256
aec5fd78e242dbc6f94b87e479982b11c2d07f50b7008df3d735a45e765d9baa
-
SHA512
737e384f576080acf8c549c349301d3aef913235a02ca065d4a06425d21779da1a8f6a198d399e386977d4f7d92e7083a2ae46a16362782716541e460908a957
-
SSDEEP
12288:RD7/3BHTnGdBbrxr5kwvhnN9Lto9ghiJGZ/O:RD7/BHjGdBPxlfnN9LquhiuO
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-