General
-
Target
Client-built.exe
-
Size
78KB
-
Sample
240628-yzbfms1blg
-
MD5
c053ebb3f0f90a7705729579d25dd194
-
SHA1
fe045f0584ee3656af1e89a6ca37ef68e7f252a3
-
SHA256
85a287edb6eeb66eeada945ff71c946a76171be92244071c07d0ac5553d96cf2
-
SHA512
a5beac0ec0b1ecad655f52555ff83d756169335be383bd2dd4310b4e9d2120fb939ed42116554ae1544ed9db56a3846d6ca0369d2af0430a8d7c3717e2223854
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+nPIC:5Zv5PDwbjNrmAE+PIC
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20240419-en
Malware Config
Extracted
discordrat
-
discord_token
MTI0NzYzMjcxMjk1Nzk1NjE4Nw.G3MXNZ.B896PWyca43CGShZp7WvFVoaKLYOSP1no8IyaM
-
server_id
1247637478639271976
Targets
-
-
Target
Client-built.exe
-
Size
78KB
-
MD5
c053ebb3f0f90a7705729579d25dd194
-
SHA1
fe045f0584ee3656af1e89a6ca37ef68e7f252a3
-
SHA256
85a287edb6eeb66eeada945ff71c946a76171be92244071c07d0ac5553d96cf2
-
SHA512
a5beac0ec0b1ecad655f52555ff83d756169335be383bd2dd4310b4e9d2120fb939ed42116554ae1544ed9db56a3846d6ca0369d2af0430a8d7c3717e2223854
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+nPIC:5Zv5PDwbjNrmAE+PIC
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1