General
-
Target
Exploiter.rar
-
Size
231KB
-
Sample
240504-vx9zmscc9s
-
MD5
33c8cd926124ef8a3acdb712c67922a7
-
SHA1
fdfc1b0bc4d26153d274ee49c506f9b46d3cc3dc
-
SHA256
25981c5a22378707acf5960d2aa40a50516a1dcb9ea82dfdc1bb2067f6811bac
-
SHA512
91d788f6ae96ae7659b01733357af7d85615cb836828913db9bd552b674dbc98b380142abf25c8af33a99b65b008dcb60143e726b4baa9068aff25b652e606b9
-
SSDEEP
6144:81hpdhh2JVOffFcD7fxjlYfU/aPF7iy0t:opPh9CxjylPoj
Static task
static1
Behavioral task
behavioral1
Sample
Exploiter/Exploiter.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Exploiter/Exploiter.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
discordrat
-
discord_token
MTIzNjMwNTc2MjU5NTI0MjA1NQ.G6VLak.4vdqf2Zl4iPZ7e-AyK9ykkGmr9LZPBhhchrbdY
-
server_id
1236306342461964380
Targets
-
-
Target
Exploiter/Exploiter.exe
-
Size
447KB
-
MD5
1f45fbe95cf28a77d25bf115cc3002fe
-
SHA1
c1483030959bb50c1a3875b8202852bffee0913c
-
SHA256
514e6cb42b3b1431e89a415af7d0a98e51e4239be0c085a1730c996eef71cd9d
-
SHA512
f58574dd9efdf44bdb81adb3e6c1381a59c9afd1c7486359a8efb310e6d0e94511770288ac47cbafa80e2cb3467cb57e0c7a7e9fecc1e012dd643cf79df5d5b4
-
SSDEEP
12288:XCQjgAtAHM+vetZxF5EWry8AJGy0x4xLe4:X5ZWs+OZVEWry8AFtxe4
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-