General
-
Target
Sharp CS V1.bat
-
Size
551B
-
Sample
240629-qwkk5s1gml
-
MD5
a15cfc6331f0054de73a5353ee57bf21
-
SHA1
a58aa430e12ccb6eb1da97faf6144a28bec218c1
-
SHA256
e6c1cccd7586150fa37740b2fc0c2ecb919b0d18d257a2f7ad223678c8552a80
-
SHA512
3ee703a10768f76a3afa9be065becfb05c36ad67af9ad30849f1106deb153d975938901453a957900981bcf61330b4cd57e3ca4f4566289fb8114d8bbcfc0425
Static task
static1
Behavioral task
behavioral1
Sample
Sharp CS V1.bat
Resource
win11-20240508-en
Malware Config
Extracted
discordrat
-
discord_token
MTI0MzQwMDg0MDc3NDE2MDM4NQ.Gnre8o.K_NB2WHxREqF5j5C1y9xsPSpv67TWHFacISXVA
-
server_id
1256564842899181648
Targets
-
-
Target
Sharp CS V1.bat
-
Size
551B
-
MD5
a15cfc6331f0054de73a5353ee57bf21
-
SHA1
a58aa430e12ccb6eb1da97faf6144a28bec218c1
-
SHA256
e6c1cccd7586150fa37740b2fc0c2ecb919b0d18d257a2f7ad223678c8552a80
-
SHA512
3ee703a10768f76a3afa9be065becfb05c36ad67af9ad30849f1106deb153d975938901453a957900981bcf61330b4cd57e3ca4f4566289fb8114d8bbcfc0425
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Hide Artifacts: Hidden Files and Directories
-