General
-
Target
Sharp CS V1.bat
-
Size
433B
-
Sample
240629-mzgf4swcpa
-
MD5
79f4dfedde066329feb0c23b9a95920d
-
SHA1
470bd43b15f11f0583e5357c1f8223ed688559b0
-
SHA256
5051740849cc567c88d930dbff64dbe995f400c68a2f8c25a38ccdd9f2b81359
-
SHA512
a5270495d09ade0056166b26cfb25be796bbf41e96639f3c69011eb1f4433829426f99e0878fcb882e0ccae91e2023cdf01ffb0c5dd22a7ce0f58eb5a09ccd5d
Static task
static1
Behavioral task
behavioral1
Sample
Sharp CS V1.bat
Resource
win11-20240611-en
Malware Config
Extracted
discordrat
-
discord_token
MTI0MzQwMDg0MDc3NDE2MDM4NQ.GC8XoW.GV37ZmiRqKTJrla6I_LG3ievGgv1WoBnOGAfMw
-
server_id
1256556741160599562
Targets
-
-
Target
Sharp CS V1.bat
-
Size
433B
-
MD5
79f4dfedde066329feb0c23b9a95920d
-
SHA1
470bd43b15f11f0583e5357c1f8223ed688559b0
-
SHA256
5051740849cc567c88d930dbff64dbe995f400c68a2f8c25a38ccdd9f2b81359
-
SHA512
a5270495d09ade0056166b26cfb25be796bbf41e96639f3c69011eb1f4433829426f99e0878fcb882e0ccae91e2023cdf01ffb0c5dd22a7ce0f58eb5a09ccd5d
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Hide Artifacts: Hidden Files and Directories
-