General

  • Target

    DiscordOptimizer__v1.1.8.exe

  • Size

    17.7MB

  • Sample

    240511-vppzhagg6v

  • MD5

    5ba3ce5afcf83c62650e811107aa875d

  • SHA1

    1d1cbe5b70552f8a840f5e9a881090ef2fff5989

  • SHA256

    ce5f5d1c7e74ad06baf947cfb4e2c792bb7b8b3b39941cfdfed01fbbbe888202

  • SHA512

    060eac51b7ccfb676ed1844ec1ae51198b2cd2396741d2ea66d7c8281190c875511b61697d1746cbe825da65442ce4ccd9abdb958db2f16f9c2f70d7c57f769a

  • SSDEEP

    393216:+qPnLFXlrSQ8DOETgsvfGuge9vUvEu3ONVYq:zPLFXNSQhEv/FNhNf

Malware Config

Targets

    • Target

      DiscordOptimizer__v1.1.8.exe

    • Size

      17.7MB

    • MD5

      5ba3ce5afcf83c62650e811107aa875d

    • SHA1

      1d1cbe5b70552f8a840f5e9a881090ef2fff5989

    • SHA256

      ce5f5d1c7e74ad06baf947cfb4e2c792bb7b8b3b39941cfdfed01fbbbe888202

    • SHA512

      060eac51b7ccfb676ed1844ec1ae51198b2cd2396741d2ea66d7c8281190c875511b61697d1746cbe825da65442ce4ccd9abdb958db2f16f9c2f70d7c57f769a

    • SSDEEP

      393216:+qPnLFXlrSQ8DOETgsvfGuge9vUvEu3ONVYq:zPLFXNSQhEv/FNhNf

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks