General
-
Target
XBinderOutput.exe
-
Size
137KB
-
Sample
240512-pghmkahd94
-
MD5
4ab779755561a8482dddbe1abad37ad1
-
SHA1
e23831bb043fe6993ef738f39e53083aad249d59
-
SHA256
6ee3c0bd479790df923c06fa453b9dbd341533da9842eb8cdfeaea4c25f124aa
-
SHA512
8ef9b56e8bd56e3d8ddb0e87091701fd142700e9d35e2fa8f92843bff9b176aaf0f7d1bdcfdb2497562b94ad0d5b9be25dcc13e744bcf567200f870930bda734
-
SSDEEP
3072:x69aH7fFuyMf1pX9VHQy3+T9V6ys2IEEUkJ284w9Dd39NjpY:s9aHjFF0zB3+TDN+Jkw9R397
Static task
static1
Behavioral task
behavioral1
Sample
XBinderOutput.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
discordrat
-
discord_token
MTIzOTE4ODEwNDA4Mjg4NjcxNg.GIxCFf.GVfBixIoImSEUH3nqBaHSCda2w6A3eQ_loapSc
-
server_id
1238373593272815617
Targets
-
-
Target
XBinderOutput.exe
-
Size
137KB
-
MD5
4ab779755561a8482dddbe1abad37ad1
-
SHA1
e23831bb043fe6993ef738f39e53083aad249d59
-
SHA256
6ee3c0bd479790df923c06fa453b9dbd341533da9842eb8cdfeaea4c25f124aa
-
SHA512
8ef9b56e8bd56e3d8ddb0e87091701fd142700e9d35e2fa8f92843bff9b176aaf0f7d1bdcfdb2497562b94ad0d5b9be25dcc13e744bcf567200f870930bda734
-
SSDEEP
3072:x69aH7fFuyMf1pX9VHQy3+T9V6ys2IEEUkJ284w9Dd39NjpY:s9aHjFF0zB3+TDN+Jkw9R397
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-