General
-
Target
malware.bin
-
Size
4.7MB
-
Sample
240715-lbnd3ssbrb
-
MD5
cf3498a5b7087f12b97f746c644bb60a
-
SHA1
bcb7c90fac1b84c891d54742efc3db9b64b59f94
-
SHA256
1469af0195b28f87817548a6063a5dd062ab2d0fd77a20b749625ccef01e292f
-
SHA512
8df02ec2f8aa5ff2da094adaead7c23e158f93db31d3d9ac423ec882c5a26704905f1459b917a97f00a9938092ccc35976d26e6ffab8b5f804c473bebac65254
-
SSDEEP
98304:WS5vaHahdYUk2TjtDRtVqDRpDv7hl+1jLPtVeNr3b:WP6Y21DRTqDb7GRVeNr3b
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
discordrat
-
discord_token
MTI2MTcwMjM0NDQ4ODUyMTgwOQ.GItusX.BlaHBlSUZLcFqixVU_n9ThfF3DpKJGJou_LNIE
-
server_id
1261770885514137682
Targets
-
-
Target
malware.bin
-
Size
4.7MB
-
MD5
cf3498a5b7087f12b97f746c644bb60a
-
SHA1
bcb7c90fac1b84c891d54742efc3db9b64b59f94
-
SHA256
1469af0195b28f87817548a6063a5dd062ab2d0fd77a20b749625ccef01e292f
-
SHA512
8df02ec2f8aa5ff2da094adaead7c23e158f93db31d3d9ac423ec882c5a26704905f1459b917a97f00a9938092ccc35976d26e6ffab8b5f804c473bebac65254
-
SSDEEP
98304:WS5vaHahdYUk2TjtDRtVqDRpDv7hl+1jLPtVeNr3b:WP6Y21DRTqDb7GRVeNr3b
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-