General
-
Target
file
-
Size
312KB
-
Sample
240702-xc64csygpp
-
MD5
a85e8c872d3bd4a0d870d0ace8ac55af
-
SHA1
88c7c98e1e815678c2c3301bde54652da17e2962
-
SHA256
66d1b7730d226aeea411fedb685fd3ce9c4e5cdd11d7367db4abc0ec5c625ea0
-
SHA512
6358fa1395c27784e0622b52e681eacf736467afa6b6f3a98cc05ea5845cfeaee30699b789c8ffef44a562500b52c055f16fca0fe887f6d30c33c80ee58b9613
-
SSDEEP
3072:6ipgAkHnjPIQ6KSEc/iHfPaW+LN7DxRLlzglKnViNk:TgAkHnjPIQBSEz/PCN7jBnViNk
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
file.html
Resource
win11-20240508-en
Malware Config
Extracted
discordrat
-
discord_token
MTI1Njk2MTU3MDM0MTI2MTM0Mw.G2jsSE.fwfDhga89T38Vkr6KKPeUy8EFRSYPByb0GnYBY
-
server_id
1256961368641372210
Targets
-
-
Target
file
-
Size
312KB
-
MD5
a85e8c872d3bd4a0d870d0ace8ac55af
-
SHA1
88c7c98e1e815678c2c3301bde54652da17e2962
-
SHA256
66d1b7730d226aeea411fedb685fd3ce9c4e5cdd11d7367db4abc0ec5c625ea0
-
SHA512
6358fa1395c27784e0622b52e681eacf736467afa6b6f3a98cc05ea5845cfeaee30699b789c8ffef44a562500b52c055f16fca0fe887f6d30c33c80ee58b9613
-
SSDEEP
3072:6ipgAkHnjPIQ6KSEc/iHfPaW+LN7DxRLlzglKnViNk:TgAkHnjPIQBSEz/PCN7jBnViNk
Score10/10-
Enumerates VirtualBox DLL files
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-