General

  • Target

    release.zip

  • Size

    445KB

  • Sample

    240628-wz9x4aybpg

  • MD5

    06a4fcd5eb3a39d7f50a0709de9900db

  • SHA1

    50d089e915f69313a5187569cda4e6dec2d55ca7

  • SHA256

    c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97

  • SHA512

    75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b

  • SSDEEP

    12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQI:BKGo8EifSQwYWI

Malware Config

Targets

    • Target

      release.zip

    • Size

      445KB

    • MD5

      06a4fcd5eb3a39d7f50a0709de9900db

    • SHA1

      50d089e915f69313a5187569cda4e6dec2d55ca7

    • SHA256

      c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97

    • SHA512

      75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b

    • SSDEEP

      12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQI:BKGo8EifSQwYWI

    Score
    1/10
    • Target

      Release/Discord rat.exe

    • Size

      79KB

    • MD5

      d13905e018eb965ded2e28ba0ab257b5

    • SHA1

      6d7fe69566fddc69b33d698591c9a2c70d834858

    • SHA256

      2bd631c6665656673a923c13359b0dc211debc05b2885127e26b0dce808e2dec

    • SHA512

      b95bfdebef33ac72b6c21cdf0abb4961222b7efd17267cd7236e731dd0b6105ece28e784a95455f1ffc8a6dd1d580a467b07b3bd8cb2fb19e2111f1a864c97cb

    • SSDEEP

      1536:YCH0jBD2BKkwbPNrfxCXhRoKV6+V+y9viwp:VUjBD2BPwbPNrmAE+MqU

    • Target

      builder.exe

    • Size

      10KB

    • MD5

      4f04f0e1ff050abf6f1696be1e8bb039

    • SHA1

      bebf3088fff4595bfb53aea6af11741946bbd9ce

    • SHA256

      ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa

    • SHA512

      94713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12

    • SSDEEP

      96:IJXYAuB2glBLgyOk3LxdjP2rm549JSTuwUYXzP+B1izXTa/HFpff3LG+tzNt:IJXDk7LI4uwtDPC1ijCHffSs

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      dnlib.dll

    • Size

      1.1MB

    • MD5

      508ccde8bc7003696f32af7054ca3d97

    • SHA1

      1f6a0303c5ae5dc95853ec92fd8b979683c3f356

    • SHA256

      4758c7c39522e17bf93b3993ada4a1f7dd42bb63331bac0dcd729885e1ba062a

    • SHA512

      92a59a2e1f6bf0ce512d21cf4148fe027b3a98ed6da46925169a4d0d9835a7a4b1374ba0be84e576d9a8d4e45cb9c2336e1f5bd1ea53e39f0d8553db264e746d

    • SSDEEP

      24576:WHjoaczZfdE55hHl0WQ/OO4yb99MANKtv7f2dcME:tm/BQWgww

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks