General
-
Target
Client-built.bat
-
Size
276KB
-
Sample
240513-g9429sde67
-
MD5
0c82a2b143ba3344234988e76a83fb9e
-
SHA1
41867630fed3a008020947c217b2d3029f0f7203
-
SHA256
0bfc1382aa6e0329b1787ba6e1da7c615698c40ebe3acc4c7eaf59393127e7ca
-
SHA512
491799b57350191479067677d9e98dd6dfb6f4e3755acbf806cbf9f7a5f4109822f03fbe7e216cfb19d8ccab49593b3fd07a06e524f8d75bb7a8e22b9b147e03
-
SSDEEP
6144:Rf7Ie6igEJsHvviyhG8gbKXFOyPUCWxyRKuwlAvB1PIg:VrgEYvviyKuSxLuwlAv/Ig
Static task
static1
Behavioral task
behavioral1
Sample
Client-built.bat
Resource
win10v2004-20240508-en
Malware Config
Extracted
discordrat
-
discord_token
MTIxMjYwMTc0NTU0OTgxOTkyNA.G6ob17.hVj0y7t0oSi-tGvj_U-QqOqKV-xvE9qC8cf2k4
-
server_id
1239461504776933396
Targets
-
-
Target
Client-built.bat
-
Size
276KB
-
MD5
0c82a2b143ba3344234988e76a83fb9e
-
SHA1
41867630fed3a008020947c217b2d3029f0f7203
-
SHA256
0bfc1382aa6e0329b1787ba6e1da7c615698c40ebe3acc4c7eaf59393127e7ca
-
SHA512
491799b57350191479067677d9e98dd6dfb6f4e3755acbf806cbf9f7a5f4109822f03fbe7e216cfb19d8ccab49593b3fd07a06e524f8d75bb7a8e22b9b147e03
-
SSDEEP
6144:Rf7Ie6igEJsHvviyhG8gbKXFOyPUCWxyRKuwlAvB1PIg:VrgEYvviyKuSxLuwlAv/Ig
Score10/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-