General
-
Target
keep safe.exe
-
Size
78KB
-
Sample
240703-vn4fhazblk
-
MD5
161e7e7c7c33737fa13cf299f5de7bf8
-
SHA1
c159f9f2822c45e4f79de8fb59bb19e7e8ee36b1
-
SHA256
575eda3b9431c8a303be6c734aa85e4bc1b27d547b3f758f71f937d96ef3a50d
-
SHA512
01ad7f71e02da53088f58f0ee6c02a0d378d9dcd6a0ff61f4f27910681ef8de1a2641e70716e4b77c79ab2a313bcc1afdca0d1bf36e4e2bfe1d0e13fb5ae8f8d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC
Behavioral task
behavioral1
Sample
keep safe.exe
Resource
win11-20240611-en
Malware Config
Extracted
discordrat
-
discord_token
MTIzNDIwMzg4MDI0MjU0ODc4OQ.GnCtHh.ILBrbeZaD2WcnKYL9n7q5C3RNZnunVB1vxbYdM
-
server_id
1249930029291536444
Targets
-
-
Target
keep safe.exe
-
Size
78KB
-
MD5
161e7e7c7c33737fa13cf299f5de7bf8
-
SHA1
c159f9f2822c45e4f79de8fb59bb19e7e8ee36b1
-
SHA256
575eda3b9431c8a303be6c734aa85e4bc1b27d547b3f758f71f937d96ef3a50d
-
SHA512
01ad7f71e02da53088f58f0ee6c02a0d378d9dcd6a0ff61f4f27910681ef8de1a2641e70716e4b77c79ab2a313bcc1afdca0d1bf36e4e2bfe1d0e13fb5ae8f8d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-