General
-
Target
Client-built.exe
-
Size
78KB
-
Sample
240628-w5zdjs1grj
-
MD5
9f8192bca777a039d99372a530cdb635
-
SHA1
a2556acb2ef8989c7d1b07d1744a0b5fd7f58a68
-
SHA256
9d75cc219fc049368f2dcd1a0e2b6d770c5c00e25e9fcaa43cbffb64beec2f4f
-
SHA512
9e32db23374ac09ef4833fd1b5e603c294842dc380daca3aa6f2cf27d5be9df081634c589b97f7850c7eadbf672bf3ad5a2f580b6dbb570a68f7280524de3f81
-
SSDEEP
1536:F2WjO8XeEXFd5P7v88wbjNrfxCXhRoKV6+V+4PIC:FZz5PDwbjNrmAE+cIC
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
discordrat
-
discord_token
OTg4NTc4MzE5NDUwNjU2ODA4.GJB_CK.pGGNRyaGaQAGmQrFjvmnUeTW-IdHcYf2pAyEXQ
-
server_id
1163956714090016808
Targets
-
-
Target
Client-built.exe
-
Size
78KB
-
MD5
9f8192bca777a039d99372a530cdb635
-
SHA1
a2556acb2ef8989c7d1b07d1744a0b5fd7f58a68
-
SHA256
9d75cc219fc049368f2dcd1a0e2b6d770c5c00e25e9fcaa43cbffb64beec2f4f
-
SHA512
9e32db23374ac09ef4833fd1b5e603c294842dc380daca3aa6f2cf27d5be9df081634c589b97f7850c7eadbf672bf3ad5a2f580b6dbb570a68f7280524de3f81
-
SSDEEP
1536:F2WjO8XeEXFd5P7v88wbjNrfxCXhRoKV6+V+4PIC:FZz5PDwbjNrmAE+cIC
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-