General
-
Target
FREE-UNBAN.exe
-
Size
11.9MB
-
Sample
240607-djl7zsgf3t
-
MD5
deabf59f720f28d237fd34a497295182
-
SHA1
bcc3f454d7b02df4a35e497c0f72572c33e8ea67
-
SHA256
b8d2844e37a379d96f22c0ca6e4fbfa2b34fe2cf7f0233cd3724b6c11b426ce0
-
SHA512
3abde0c0198a1857329426e1810e33e7b3b3dae4fc2fccbd02344541cd9adc965f371ab0e2e06d65a9ffd269cfecb4e745d5baa6426606a9d6aca4702a5471a7
-
SSDEEP
196608:Aqw65La7f9DJwP/GAkKtwHwAce28vF//C7eanr+nJktEnKe2p1hk77qAyV9FYepp:QJwP/nkgyqeanGkunKe2LhkXNyV9iMYY
Static task
static1
Behavioral task
behavioral1
Sample
FREE-UNBAN.exe
Resource
win7-20231129-en
Malware Config
Extracted
discordrat
-
discord_token
MTI0NjcxMzUzNDUxNjAzNTY2NA.Gxl_pA.KE9MjXSVDtnUBHfXBt-PJLOkYAdTCbZUddEf-Q
-
server_id
1248003561623781476
Targets
-
-
Target
FREE-UNBAN.exe
-
Size
11.9MB
-
MD5
deabf59f720f28d237fd34a497295182
-
SHA1
bcc3f454d7b02df4a35e497c0f72572c33e8ea67
-
SHA256
b8d2844e37a379d96f22c0ca6e4fbfa2b34fe2cf7f0233cd3724b6c11b426ce0
-
SHA512
3abde0c0198a1857329426e1810e33e7b3b3dae4fc2fccbd02344541cd9adc965f371ab0e2e06d65a9ffd269cfecb4e745d5baa6426606a9d6aca4702a5471a7
-
SSDEEP
196608:Aqw65La7f9DJwP/GAkKtwHwAce28vF//C7eanr+nJktEnKe2p1hk77qAyV9FYepp:QJwP/nkgyqeanGkunKe2LhkXNyV9iMYY
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Virtualization/Sandbox Evasion
1